Hacker News new | past | comments | ask | show | jobs | submit | from login
A few thoughts about Signal’s Secure Value Recovery (cryptographyengineering.com)
34 points by feross 25 days ago | past | 31 comments
Searchable encryption and the ever-expanding leakage function (2019) (cryptographyengineering.com)
1 point by mooreds 50 days ago | past
What is the Random Oracle Model and why should you care? (cryptographyengineering.com)
4 points by noch 82 days ago | past
Does Zoom use end-to-end encryption? (cryptographyengineering.com)
190 points by feross 4 months ago | past | 99 comments
Zero Knowledge Proofs: An illustrated primer (2014) (cryptographyengineering.com)
22 points by rrauenza 5 months ago | past | 1 comment
The EARN IT act is an attack on end-to-end encryption (cryptographyengineering.com)
715 points by jmsflknr 5 months ago | past | 309 comments
Zero Knowledge Proofs: An illustrated primer (2016) (cryptographyengineering.com)
3 points by jxub 5 months ago | past
What is the Random Oracle Model and why should you care? (cryptographyengineering.com)
1 point by beefhash 7 months ago | past
What is the random oracle model and why should you care? (Part 5) (cryptographyengineering.com)
1 point by feross 7 months ago | past
On Client-Side Media Scanning – A Few Thoughts on Cryptographic Engineering (cryptographyengineering.com)
7 points by generalpass 8 months ago | past
How Safe Is Apple’s Safe Browsing? (cryptographyengineering.com)
33 points by feross 8 months ago | past | 3 comments
How to choose an Authenticated Encryption mode (2012) (cryptographyengineering.com)
1 point by praxyz 8 months ago | past
How Safe Is Apple’s Safe Browsing? (cryptographyengineering.com)
1 point by dredmorbius 9 months ago | past
How Safe Is Apple’s Safe Browsing? (cryptographyengineering.com)
1 point by segfaultbuserr 9 months ago | past
How Safe Is Apple’s Safe Browsing? (cryptographyengineering.com)
3 points by stargrave 9 months ago | past
How Safe Is Apple’s Safe Browsing? (cryptographyengineering.com)
4 points by feross 9 months ago | past
Looking Back at the Snowden Revelations (cryptographyengineering.com)
1 point by auslander 10 months ago | past | 1 comment
Looking Back at the Snowden Revelations (cryptographyengineering.com)
401 points by sohkamyung 10 months ago | past | 231 comments
Looking Back at the Snowden Revelations (cryptographyengineering.com)
4 points by feross 10 months ago | past
Is Apple’s Cloud Key Vault a Crypto Backdoor? (2017) (cryptographyengineering.com)
2 points by auslander 11 months ago | past | 1 comment
Why can’t Apple decrypt your iPhone? (cryptographyengineering.com)
1 point by auslander 12 months ago | past
Why can’t Apple decrypt your iPhone? (cryptographyengineering.com)
2 points by pcr910303 on July 25, 2019 | past
How does Apple privately find offline devices? (cryptographyengineering.com)
347 points by kandarpck on June 5, 2019 | past | 185 comments
Searchable encryption and the ever-expanding leakage function (cryptographyengineering.com)
1 point by chopin on Mar 5, 2019 | past
Data Leakage from Encrypted Databases (cryptographyengineering.com)
1 point by rendall on Mar 1, 2019 | past
Searchable encryption and the ever-expanding leakage function (cryptographyengineering.com)
3 points by Xylakant on Feb 14, 2019 | past
Searchable encryption and the ever-expanding leakage function (cryptographyengineering.com)
2 points by sohkamyung on Feb 12, 2019 | past
On Ghost Users and Messaging Backdoors (cryptographyengineering.com)
97 points by kandarpck on Dec 18, 2018 | past | 55 comments
On cellular encryption (2013) (cryptographyengineering.com)
34 points by wglb on Oct 25, 2018 | past | 12 comments
Let’s talk about PAKE (cryptographyengineering.com)
138 points by stargrave on Oct 19, 2018 | past | 98 comments

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: