Hacker News
- ExtremeBB – Supporting Large-Scale Research into Misogyny and Online Extremism https://www.lightbluetouchpaper.org/2022/09/02/extremebb-supporting-large-scale-research-into-misogyny-and-online-extremism/ 15 comments
- Formal CHERI: design-time proof of architecture security properties https://www.lightbluetouchpaper.org/2022/07/22/formal-cheri/ 2 comments
- Data ordering attacks on deep neural networks https://www.lightbluetouchpaper.org/2021/04/23/data-ordering-attacks/ 4 comments
- European Commission prefers breaking privacy to protecting kids https://www.lightbluetouchpaper.org/2022/05/11/european-commission-prefers-breaking-privacy-to-protecting-kids/ 187 comments
- Struck by a Thunderbolt https://www.lightbluetouchpaper.org/2019/02/26/struck-by-a-thunderbolt/ 61 comments
- Tracing stolen Bitcoin, using a precedent from 1816 https://www.lightbluetouchpaper.org/2018/03/26/tracing-stolen-bitcoin/ 45 comments
- Ethical issues in research using datasets of illicit origin https://www.lightbluetouchpaper.org/2017/11/07/ethical-issues-in-research-using-datasets-of-illicit-origin/ 19 comments
- Post-Snowden: The Economics of Surveillance http://www.lightbluetouchpaper.org/2014/05/27/post-snowden-the-economics-of-surveillance/ 23 comments
- Heartbleed and RSA private keys http://www.lightbluetouchpaper.org/2014/04/25/heartbleed-and-rsa-private-keys/ 3 comments
- Moore’s Law won’t kill passwords http://www.lightbluetouchpaper.org/2013/01/17/moores-law-wont-kill-passwords/ 24 comments
- JPEG canaries: exposing on-the-fly recompression http://www.lightbluetouchpaper.org/2011/02/04/jpeg-copy-evidence/ 24 comments
- Optimised to fail: Card readers for online banking http://www.lightbluetouchpaper.org/2009/02/26/optimised-to-fail-card-readers-for-online-banking/ 6 comments
Lobsters
- Trojan Source: Invisible Vulnerabilities https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ 10 comments security
- Hardware Scrambling – No More Password Leaks http://www.lightbluetouchpaper.org/2014/03/07/hardware-scrambling-no-more-password-leaks/ 8 comments hardware , security
- "Bugs in our pockets?" - major new white paper from notable cryptographers casts shadow upon "client-side scanning" plans of Apple, European Union; announcement blogpost links to press coverage. https://www.lightbluetouchpaper.org/2021/10/15/bugs-in-our-pockets/ 34 comments privacy
- Struck by a Thunderbolt | Light Blue Touchpaper https://www.lightbluetouchpaper.org/2019/02/26/struck-by-a-thunderbolt/ 6 comments linux
- "Meeting Snowden in Princeton" - Cambridge University's 'Head of Cryptography' on Technology and Surveillance https://www.lightbluetouchpaper.org/2015/05/02/meeting-snowden-in-princeton/ 3 comments privacy
- There exists a classical model of the photon after all https://www.lightbluetouchpaper.org/2015/02/23/maxwell/ 5 comments science
- Hot or Not: Revealing Hidden Services by their Clock Skew http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ 28 comments netsec
- Hot or Not: Revealing Hidden Services by their Clock Skew http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ 23 comments compsci
- Hacker group claims to have defaced bank's site, accidentally defaced a phishing site impersonating the bank instead http://www.lightbluetouchpaper.org/2014/03/05/ghosts-of-banking-past/ 6 comments netsec
- “Perfectly” Encrypt 50 Letters By Hand http://www.lightbluetouchpaper.org/2014/01/06/perfectly-encrypt-50-letters-by-hand/ 18 comments crypto
- We found that software on your smartphone can work out what PIN you’re entering by watching your face through the camera and listening for the clicks as you type. http://www.lightbluetouchpaper.org/2013/11/08/5653/ 13 comments netsec
- Security problems with offender tagging in UK http://www.lightbluetouchpaper.org/2013/09/02/offender-tagging/ 7 comments technology
- Second Edition of Ross Anderson's "Security Engineering" book now available for free online http://www.lightbluetouchpaper.org/2013/02/04/security-engineering-now-available-free-online/ 10 comments netsec
- Password cracking, part I: how much has cracking improved? http://www.lightbluetouchpaper.org/2012/09/03/password-cracking-part-i-how-much-has-cracking-improved/ 7 comments netsec
- The science of password guessing http://www.lightbluetouchpaper.org/2012/05/24/the-science-of-password-guessing/ 10 comments netsec
- Last JBIG patent finally expired today. This means that distros no longer have to disable the printers that require it. http://www.lightbluetouchpaper.org/2012/04/04/one-line-software-patent/ 16 comments linux
- A one-line software patent http://www.lightbluetouchpaper.org/2012/04/04/one-line-software-patent/ 198 comments programming
- FreeBSD 9.0 ships with security capabilities and userland sandbox API support http://www.lightbluetouchpaper.org/2012/01/30/freebsd-9-0-ships-with-experimental-capsicum-support/ 29 comments netsec
- Want to create a really strong password? Don’t ask Google http://www.lightbluetouchpaper.org/2011/11/08/want-to-create-a-really-strong-password-dont-ask-google/ 51 comments netsec
- UK banks attempt to censor academic paper; Cambridge University resists http://www.lightbluetouchpaper.org/2010/12/25/a-merry-christmas-to-all-bankers/ 22 comments reddit.com
- Chip and PIN is broken http://www.lightbluetouchpaper.org/2010/02/11/chip-and-pin-is-broken/ 8 comments compsci
- How Privacy Fails: The Facebook Applications Debacle - Facebook ads end up charging your mobile phone $20 a month http://www.lightbluetouchpaper.org/2009/06/09/how-privacy-fails-the-facebook-applications-debacle/ 20 comments netsec
- Facebook photos still insecure; Easy to circumvent privacy settings to see any photo http://www.lightbluetouchpaper.org/2009/02/11/new-facebook-photo-hacks/ 64 comments programming
- How effective is the wisdom of crowds as a security mechanism? http://www.lightbluetouchpaper.org/2007/12/21/how-effective-is-the-wisdom-of-crowds-as-a-security-mechanism/ 3 comments programming
- Google as a password cracker http://www.lightbluetouchpaper.org/2007/11/16/google-as-a-password-cracker/ 71 comments programming
- Revealing Hidden Services by their Clock Skew http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ 12 comments programming
- Attacking Tor (and other anonymity services) by warming up a CPU and measuring the resulting change in clock skew http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ 13 comments reddit.com
- Reverse-stalking the Bank of England through web logs http://www.lightbluetouchpaper.org/2006/05/18/watching-them-watching-me/ 3 comments reddit.com