Hacker Newsnew | comments | ask | jobs | submit | adulau's submissionslogin
1.
NSA Research 1998 (cryptome.org)
1 point by adulau 51 days ago | discuss
2.
Information Theoretical Cryptogenography (How much information can they leak?) (arxiv.org)
1 point by adulau 61 days ago | discuss
3.
Cryptotronix Hashlet – HRNG, Key storage for the BeagleBone or Raspberry Pi (cryptotronix.com)
2 points by adulau 69 days ago | discuss
4.
Sci-Fi Crypto (always deciphered to a grammatically correct attemptext) (yobi.be)
1 point by adulau 71 days ago | discuss
5.
Umap is a tool which allows you to test the security of USB host implementations (github.com)
1 point by adulau 72 days ago | discuss
6.
Announce: OpenSSH 6.5 released (mindrot.org)
2 points by adulau 78 days ago | discuss
7.
Factory Jobs Are Gone. Get Over It (businessweek.com)
2 points by adulau 82 days ago | discuss
8.
Windbg extension for VM traffic manipulation and analysis (code.google.com)
1 point by adulau 85 days ago | discuss
9.
NATO Peacetime State Activities in Cyberspace [scribd] (cryptome.org)
2 points by adulau 89 days ago | discuss
10.
Einstein’s Camera (medium.com)
6 points by adulau 92 days ago | discuss
11.
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using SE [scribd] (rackcdn.com)
1 point by adulau 94 days ago | discuss
12.
Understanding the Robustness of SSDs under Power Fault [scribd] (usenix.org)
1 point by adulau 94 days ago | discuss
13.
Radiation Dose measured at Monitoring Post of Fukushima Daiichi Nuclear PS (tepco.co.jp)
1 point by adulau 104 days ago | discuss
14.
Elastic Pathing: Your Speed is Enough to Track You (arxiv.org)
2 points by adulau 104 days ago | discuss
15.
The GNU Name System and the Future of Social Networking with GNUnet [scribd] (grothoff.org)
1 point by adulau 105 days ago | discuss
16.
Steam coming from Fukushima Unit 3 reactor building (enenews.com)
12 points by adulau 107 days ago | comments
17.
Attacking Tor through Unpopular Ports [scribd] (edu.sa)
1 point by adulau 118 days ago | discuss
18.
Distributed Machine Learning Made Easy (mlbase.org)
4 points by adulau 123 days ago | comments
19.
Stealthy Dopant-Level Hardware Trojans [scribd] (umass.edu)
1 point by adulau 147 days ago | discuss
20.
LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens [scribd] (europa.eu)
1 point by adulau 158 days ago | discuss
21.
Cross-Platform Malware: Write Once, Infect Everywhere [scribd] (iseclab.org)
2 points by adulau 159 days ago | discuss
22.
Morris Worm (25th anniversary) - source code and papers (foo.be)
2 points by adulau 168 days ago | discuss
23.
De-anonymizing Users of French Political Forums [pdf] [scribd] (hack.lu)
97 points by adulau 172 days ago | comments
24.
Automated vulnerability scanning and exploitation [scribd] (hack.lu)
1 point by adulau 173 days ago | discuss
25.
Wiretapping an entire Cisco VOIP environment [scribd] (hack.lu)
1 point by adulau 175 days ago | discuss
26.
The NSA back door to NIST (jiggerwit.wordpress.com)
11 points by adulau 184 days ago | comments
27.
Galileo Development Board (intel.com)
2 points by adulau 197 days ago | discuss
28.
Net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit (kernel.org)
2 points by adulau 216 days ago | discuss
29.
Beyond Nash Equilibrium: Solution Concepts for the 21st Century (arxiv.org)
2 points by adulau 220 days ago | discuss
30.
The surveillance society: pros, cons, alternatives, and my view. (fcohen) [scribd] (all.net)
1 point by adulau 228 days ago | discuss
More

Lists | RSS | Bookmarklet | Guidelines | FAQ | DMCA | News News | Feature Requests | Bugs | Y Combinator | Apply | Library

Search: