Hacker News
- Tor 0day: Snowflake https://www.hackerfactor.com/blog/index.php?%2Farchives%2F944-Tor-0day-Snowflake.html= 2 comments
- Connecting the iDOTs (2020) https://www.hackerfactor.com/blog/index.php?%2Farchives%2F895-Connecting-the-iDOTs.html= 36 comments
- PhotoDNA and Limitations https://www.hackerfactor.com/blog/index.php?%2Farchives%2F931-PhotoDNA-and-Limitations.html= 15 comments
- One Bad Apple https://www.hackerfactor.com/blog/index.php?%2Farchives%2F929-One-Bad-Apple.html= 524 comments
- The Canary Chirps https://www.hackerfactor.com/blog/index.php?%2Farchives%2F911-The-Canary-Chirps.html= 17 comments
- Tor 0day: Finding IP Addresses https://www.hackerfactor.com/blog/index.php?%2Farchives%2F896-Tor-0day-Finding-IP-Addresses.html= 117 comments
- Body by Victoria (2009) http://www.hackerfactor.com/blog/index.php?%2Farchives%2F322-Body-By-Victoria.html= 38 comments
- Exploiting the TOR-Browser http://www.hackerfactor.com/blog/index.php?%2Farchives%2F761-Exploiting-the-TOR-Browser.html= 85 comments
- Ad Nauseam http://www.hackerfactor.com/blog/index.php?%2Farchives%2F713-Ad-Nauseam.html= 58 comments
- Putin on the Ritz http://www.hackerfactor.com/blog/index.php?%2Farchives%2F595-Putin-on-the-Ritz.html= 85 comments
- Life of Brian (Krebs) http://www.hackerfactor.com/blog/index.php?%2Farchives%2F596-Life-of-Brian.html= 50 comments
- How Perceptual Hashes Work http://www.hackerfactor.com/blog/index.php?%2Farchives%2F432-Looks-Like-It.html= 75 comments
- Fukushima: Radiation Detection Using Artifacts in CCCD Image? http://www.hackerfactor.com/blog/index.php?%2Farchives%2F427-Radiation-Detection.html= 43 comments
Lobsters
- Pinging Locations https://www.hackerfactor.com/blog/index.php?%2Farchives%2F989-Pinging-Locations.html= 2 comments networking , security
- Perceptual hash algorithms (2011) https://www.hackerfactor.com/blog/?%2Farchives%2F432-Looks-Like-It.html= 5 comments privacy , programming
- Deanonymizing Tor Circuits https://www.hackerfactor.com/blog/index.php?%2Farchives%2F868-Deanonymizing-Tor-Circuits.html= 7 comments networking , privacy
- Internet Archive Mirror Attacked Over Tor http://www.hackerfactor.com/blog/index.php?%2Farchives%2F762-Attacked-Over-Tor.html= 8 comments networking , reversing
- One Bad Apple - The Hacker Factor Blog https://www.hackerfactor.com/blog/index.php?%2Farchives%2F929-One-Bad-Apple.html= 4 comments privacy
- One Bad Apple - An expert in cryptographic hashing, who has tried to work with NCMEC, weighs in on the CSAM Apple announcement https://www.hackerfactor.com/blog/index.php?%2Farchives%2F929-One-Bad-Apple.html= 248 comments apple
- Tor 0day: Finding IP Addresses https://www.hackerfactor.com/blog/index.php?/archives/896-tor-0day-finding-ip-addresses.html 6 comments programming
- Tor 0day: Finding IP Addresses https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html 13 comments privacy
- Tor 0day: Finding IP Addresses https://www.hackerfactor.com/blog/index.php?/archives/896-tor-0day-finding-ip-addresses.html 35 comments netsec
- Tor 0day: Stopping Tor Connections https://www.hackerfactor.com/blog/index.php?/archives/888-tor-0day-stopping-tor-connections.html 12 comments programming
- Tor 0-day report https://www.hackerfactor.com/blog/index.php?/archives/888-tor-0day-stopping-tor-connections.html 15 comments netsec
- Not So Secret Messages - The Hacker Factor Blog https://www.hackerfactor.com/blog/index.php?/archives/872-not-so-secret-messages.html 3 comments netsec
- Deanonymizing Tor Circuits https://www.hackerfactor.com/blog/index.php?/archives/868-deanonymizing-tor-circuits.html 26 comments netsec
- Building a Basic Honeypot http://www.hackerfactor.com/blog/index.php?/archives/841-building-a-basic-honeypot.html 20 comments netsec
- 8 Reasons Python Sucks https://www.hackerfactor.com/blog/index.php?/archives/825-8-reasons-python-sucks.html 34 comments programming
- Handling bot attacks against a Tor hidden service http://www.hackerfactor.com/blog/index.php?/archives/762-attacked-over-tor.html 24 comments netsec
- JP2 decoding to calculate dHash values http://www.hackerfactor.com/blog/?/archives/529-Kind-of-Like-That.html 7 comments rust
- Can this code be written with iterators instead of two for loops? http://www.hackerfactor.com/blog/index.php?/archives/529-Kind-of-Like-That.html 29 comments rust
- You Want My Facebook Password? http://www.hackerfactor.com/blog/index.php?/archives/475-you-want-my-facebook-password.html 4 comments technology
- K is the New Black http://www.hackerfactor.com/blog/index.php?/archives/464-k-is-the-new-black.html 6 comments technology
- Gender Guesser attempts to determine an author's gender based on the words used. http://www.hackerfactor.com/genderguesser.php?guesser 4 comments reddit.com
- Obama's birth certificate - An analysis of the PDF document http://www.hackerfactor.com/blog/index.php?%2Farchives%2F428-after-birth.html= 6 comments reddit.com
- Can you figure out the rate of radiation being released by examining the bright spots on this image? http://www.hackerfactor.com/blog/index.php?/archives/427-radiation-detection.html 133 comments science
- Keeping Zip - Awesome analysis of the Zip file format http://www.hackerfactor.com/blog/index.php?/archives/405-keeping-zip.html 20 comments programming
- Hacker Factor: Gender Guesser - Analyzes text to determine gender of the writer, let the fun begin. http://www.hackerfactor.com/genderguesser.php#analyze 9 comments technology
- Forensic analysis of a Victoria's Secret photo http://www.hackerfactor.com/blog/index.php?/archives/322-body-by-victoria.html 27 comments reddit.com
- Gender Guesser - just input a writing sample and it can guess your gender http://www.hackerfactor.com/genderguesser.html 6 comments reddit.com