Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by n-e-w
Why are only passwords hashed?
1 points
e-sushi
2016-10-28T22:47:37Z
security.stackexchange.com
A Little-Known Company That Enables Mass Surveillance
127 points
a-no-n
2016-10-23T10:17:17Z
theintercept.com
Google Interview University
5 points
n-s-f
2016-10-23T03:26:34Z
github.com
What does a real quantum computer need for cryptanalysis and/or attack purposes?
1 points
e-sushi
2016-10-22T21:05:47Z
crypto.stackexchange.com
OSVDB is shutting down
6 points
a-no-n
2016-10-22T03:32:01Z
blog.osvdb.org
nytimes.com DNS down and/or hijacked
3 points
a-no-n
2016-10-19T08:58:21Z
uptime.com
Yipp-e
1 points
yipp-e
2016-10-19T01:48:15Z
yipp-e.com
The Password Is Dead, Long Live the Password (2016)
1 points
n-c-c-group
2016-10-14T16:22:08Z
www.nccgroup.trust
Unique app that pays you to stream live on your phone
1 points
yipp-e
2016-10-07T22:53:45Z
yipp-e.com
Vigenère cipher with sha512 and a little foresight turn into a safe one-time pad?
2 points
e-sushi
2016-10-07T05:38:33Z
crypto.stackexchange.com
A Noob’s Guide to Mesh Networking
2 points
e-sushi
2016-10-05T19:02:25Z
electronic-sushi.tumblr.com
Is Curve25519-java secure?
1 points
e-sushi
2016-10-05T16:47:49Z
crypto.stackexchange.com
A Thing, made of things, which makes many things…
1 points
e-sushi
2016-10-05T16:26:54Z
puzzling.stackexchange.com
Why is “closed source” used, and does it parallel “open source”?
1 points
e-sushi
2016-10-05T16:23:28Z
english.stackexchange.com
Why use parentheses when no argument is passed?
1 points
e-sushi
2016-10-05T16:22:49Z
programmers.stackexchange.com
What are these holes called?
1 points
e-sushi
2016-10-05T16:21:36Z
ell.stackexchange.com
Is “The empty set is a subset of any set” a convention?
1 points
e-sushi
2016-10-05T16:21:07Z
math.stackexchange.com
Is TLS secure against VM reset attacks?
2 points
e-sushi
2016-10-05T12:32:01Z
crypto.stackexchange.com
Is it OK to use a hash of the key as nonce for AES GCM?
2 points
e-sushi
2016-10-05T12:28:23Z
crypto.stackexchange.com
What Is the Purpose of the “Explicit Nonce” in TLS for AES-GCM and AES-CCM?
1 points
e-sushi
2016-10-05T12:26:32Z
crypto.stackexchange.com
32
33
34
35
36
37
38
39
40
41