Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by jedisct1
T1: Secure Programming for Embedded Systems [pdf]
52 points
jedisct1
2019-05-16T21:45:49Z
t1lang.github.io
EU-funded scientists unveil first ever image of a black hole
12 points
jedisct1
2019-04-10T13:32:03Z
europa.eu
Measuring the overhead of WebAssembly using libsodium
131 points
jedisct1
2019-04-09T14:30:52Z
00f.net
Libsodium hardens its password hash functions
2 points
jedisct1
2019-04-01T13:59:23Z
github.com
Stretch-Hash-and-Truncate, a novel algorithm for extreme DNS privacy
2 points
jedisct1
2019-04-01T13:57:05Z
github.com
DNSCloak Is Back in the App Store
2 points
jedisct1
2019-02-17T01:17:48Z
github.com
Apple Has Removed DNSCloak from the App Store
3 points
jedisct1
2019-01-06T17:05:37Z
github.com
Fastly Labs
1 points
jedisct1
2018-11-22T10:59:55Z
www.fastlylabs.com
On user authentication
2 points
jedisct1
2018-10-18T18:28:42Z
00f.net
Walt: JavaScript-like syntax for WebAssembly
278 points
jedisct1
2018-10-10T22:30:38Z
github.com
Kids can't use computers and this is why it should worry you
7 points
jedisct1
2018-08-29T20:27:08Z
www.coding2learn.org
Nikon mirrorless cameras officially announced
3 points
jedisct1
2018-08-23T09:07:33Z
www.nikonusa.com
FreeBSD Security Advisory: Resource Exhaustion in TCP Reassembly
3 points
jedisct1
2018-08-06T23:10:48Z
lists.freebsd.org
OVH Glorytun – A VPN intelligently aggregating the bandwidth of multiple links
1 points
jedisct1
2018-08-06T12:36:52Z
github.com
Labeled Tab-separated Values
2 points
jedisct1
2018-06-20T19:07:03Z
ltsv.org
Capsule8: open-source cloud-native behavioral security monitoring
1 points
jedisct1
2017-12-26T21:29:01Z
github.com
PHP 7.2.0 released
1 points
jedisct1
2017-11-30T11:37:14Z
externals.io
Photographic Image Synthesis with Cascaded Refinement Networks
2 points
jedisct1
2017-08-01T17:35:29Z
www.youtube.com
Gimli: a cross-platform permutation
1 points
jedisct1
2017-07-05T13:18:50Z
gimli.cr.yp.to
A complete break of RSA-1024 as implemented in Libgcrypt
5 points
jedisct1
2017-06-28T08:35:57Z
eprint.iacr.org
1
2
3
4
5