Hacker News new | past | comments | ask | show | jobs | submit | from login
An casual code review of MetaMask’s crypto (cryptographyengineering.com)
35 points by LittlePeter 13 days ago | past | 2 comments
An casual code review of MetaMask’s crypto (cryptographyengineering.com)
30 points by feross 14 days ago | past | 1 comment
Zero Knowledge Proofs: An illustrated primer (cryptographyengineering.com)
4 points by magicjosh 18 days ago | past
What’s the Matter with PGP? (cryptographyengineering.com)
1 point by rafamaddd 21 days ago | past | 2 comments
A few thoughts on Ray Ozzie’s “Clear” Proposal (2018) (cryptographyengineering.com)
1 point by gballan 71 days ago | past
Let’s Talk about PAKE (2018) (cryptographyengineering.com)
89 points by ctoth 3 months ago | past | 68 comments
Attack of the Week: Unpicking PLAID (2014) (cryptographyengineering.com)
1 point by nickysielicki 4 months ago | past
A riddle wrapped in a curve (2015) (cryptographyengineering.com)
38 points by nuker 5 months ago | past | 7 comments
Thinking about “traceability” (cryptographyengineering.com)
92 points by grappler 5 months ago | past | 13 comments
A case against security nihilism (cryptographyengineering.com)
468 points by feross 6 months ago | past | 332 comments
Why the FBI can’t get your browsing history from Apple iCloud (cryptographyengineering.com)
1 point by nuker 8 months ago | past
The Future of Ransomware (2017) (cryptographyengineering.com)
1 point by rdpintqogeogsaa 9 months ago | past
What’s in the Browser (Backup)? (cryptographyengineering.com)
4 points by feross 10 months ago | past
The strange story of “Extended Random” (cryptographyengineering.com)
35 points by woodruffw 11 months ago | past | 1 comment
Ok Google: please publish your DKIM secret keys (cryptographyengineering.com)
583 points by Reventlov on Nov 16, 2020 | past | 466 comments
Attack of the week: Voice calls in LTE (cryptographyengineering.com)
1 point by signa11 on Aug 29, 2020 | past
Attack of the week: Voice calls in LTE (cryptographyengineering.com)
3 points by sohkamyung on Aug 13, 2020 | past
Attack of the week: voice calls in LTE (cryptographyengineering.com)
5 points by caiobegotti on Aug 12, 2020 | past
A few thoughts about Signal’s Secure Value Recovery (cryptographyengineering.com)
34 points by feross on July 12, 2020 | past | 31 comments
Searchable encryption and the ever-expanding leakage function (2019) (cryptographyengineering.com)
1 point by mooreds on June 17, 2020 | past
What is the Random Oracle Model and why should you care? (cryptographyengineering.com)
4 points by noch on May 16, 2020 | past
Does Zoom use end-to-end encryption? (cryptographyengineering.com)
190 points by feross on April 3, 2020 | past | 99 comments
Zero Knowledge Proofs: An illustrated primer (2014) (cryptographyengineering.com)
22 points by rrauenza on March 6, 2020 | past | 1 comment
The EARN IT act is an attack on end-to-end encryption (cryptographyengineering.com)
715 points by jmsflknr on March 6, 2020 | past | 309 comments
Zero Knowledge Proofs: An illustrated primer (2016) (cryptographyengineering.com)
3 points by jxub on Feb 19, 2020 | past
What is the Random Oracle Model and why should you care? (cryptographyengineering.com)
1 point by beefhash on Jan 6, 2020 | past
What is the random oracle model and why should you care? (Part 5) (cryptographyengineering.com)
1 point by feross on Jan 6, 2020 | past
On Client-Side Media Scanning – A Few Thoughts on Cryptographic Engineering (cryptographyengineering.com)
7 points by generalpass on Dec 8, 2019 | past
How Safe Is Apple’s Safe Browsing? (cryptographyengineering.com)
33 points by feross on Nov 18, 2019 | past | 3 comments
How to choose an Authenticated Encryption mode (2012) (cryptographyengineering.com)
1 point by praxyz on Nov 12, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: