post archive
- What is Firefox Sync and why would you use it
- My Tech Wishlist
- A Bit About Certificate Transparency Gossip
- Querying CT Logs, Looking for Certificates
- All About Tor
- An Experimental "RequireCT" Directive for HSTS
- Code Execution In Spite of BitLocker
- Run Your Own Tor Network
- Booting from RAID using GRUB2
- Universal Email Encryption Specification
- Evernote, and Privacy Preserving Applications
- Funniest Exchange Ever on TLS Mailing List
- Open Technology Fund Audit Report
- About the Tor/NDA Slide Decks
- About the Cryptopocalypse
- De-Anonymizing Alt.Anonymous.Messages Followup 1
- De-Anonymizing Alt.Anonymous.Messages
- Femtocell Media Blitz, and Vegas 2013
- Dendritic arborization in dauer IL2 neurons
- Decrypting Amazon EC2 Windows Passwords
- Liberation Technology Auditing Guidelines
- The Differences Between Onion Routing and Mix Networks
- A Tagging Attack on Mixmaster
- Packet Formats
- Tagging Attacks
- Remailers We've Got
- What is a Remailer?
- Remailer Blog Posts
- An Attack on SSL Client Certificates
- Fixing Revocation for Web Browsers on the Internet
- Some Initial Thoughts on Pond
- Certificate Authorities & Pinning
- Details on CRIME
- On Couchsurfing's New Terms of Service
- An Attack on Unauthenticated Block Cipher Modes - Separator Oracle
- On the Sorry State of E-mail Security
- Black Hat EU Presentation - The IETF & The Future of Security Protocols
- An Open Letter to The Calyx Institute
- Ekoparty Presentation - Cloud & Control
- Non-Persistent PGP Keys
- US v Fricosu - Compelled Disclosure of Encryption Keys
- Beyond Padding Oracle - Manger's Oracle and RSA OAEP Padding
- Examining the CA/Browser Forum Requirements Draft
- regional broadcast using an atmospheric link layer
- bleed-through security badges
- nyu poly csaw ctf finals challenge
- an explanation of elgamal encryption
- clickonce mitm attacks
- detecting sql injection in a white-box environment
- why event validation exists in ASP.Net
- finding the columns in a user defined type in sql server and iisapp in iis 7
- i have created comments
- who's your survivor
- architecture of buenos aires
- simple crypto pack
- bruce schneier is wrong
- i have a love/hate affair with sql
- updated travel page
- comparing loop hoisting in .net
- how'd you get that scar?
- not sleeping can be dangerous for your laptop
- How to break the internet - follow standards
- being prepared
- super cool javascript hackery
- server configuration published
- crypo.biz followup
- people who shouldn't do crypto, doing crypto PART 2!
- finally put up a travel page
- people who shouldn't do crypto, doing crypto
- reading list
- the bucket list
- hacking .net's clr
- rss feed!
- authentication poc
- rfid reader
- code update
- right... I was doing that all along!
- why I hate perl
- i got project upstream-ed
- man in the middle attack
- fastest data transfer protocol
- adventure in code added
- proof of concept added
required, hidden, gravatared
required, markdown enabled (help)
* item 2
* item 3
are treated like code:
if 1 * 2 < 3:
print "hello, world!"
are treated like code: