Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by r-bit-rare-e
Android Instant Apps. 2017 Trends: Apps that run without downloading
1 points
e-nephy
2016-10-29T22:11:49Z
easternpeak.com
Why are only passwords hashed?
1 points
e-sushi
2016-10-28T22:47:37Z
security.stackexchange.com
The Surface Dial is a crazy puck that controls Microsoft's new PC
3 points
tushar-r
2016-10-26T16:39:38Z
www.theverge.com
You would vote for a liberal Donald Trump
2 points
bitlis
2016-10-26T10:56:02Z
mkwh.co
What does a real quantum computer need for cryptanalysis and/or attack purposes?
1 points
e-sushi
2016-10-22T21:05:47Z
crypto.stackexchange.com
First Hollywood feature shot in high frame rate receives mixed reviews
1 points
mark-r
2016-10-20T17:13:32Z
newatlas.com
Yipp-e
1 points
yipp-e
2016-10-19T01:48:15Z
yipp-e.com
Labs64 NetLicensing – Pricing
1 points
r-brown
2016-10-09T08:07:41Z
netlicensing.io
Unique app that pays you to stream live on your phone
1 points
yipp-e
2016-10-07T22:53:45Z
yipp-e.com
Vigenère cipher with sha512 and a little foresight turn into a safe one-time pad?
2 points
e-sushi
2016-10-07T05:38:33Z
crypto.stackexchange.com
A Noob’s Guide to Mesh Networking
2 points
e-sushi
2016-10-05T19:02:25Z
electronic-sushi.tumblr.com
Is Curve25519-java secure?
1 points
e-sushi
2016-10-05T16:47:49Z
crypto.stackexchange.com
A Thing, made of things, which makes many things…
1 points
e-sushi
2016-10-05T16:26:54Z
puzzling.stackexchange.com
Why is “closed source” used, and does it parallel “open source”?
1 points
e-sushi
2016-10-05T16:23:28Z
english.stackexchange.com
Why use parentheses when no argument is passed?
1 points
e-sushi
2016-10-05T16:22:49Z
programmers.stackexchange.com
What are these holes called?
1 points
e-sushi
2016-10-05T16:21:36Z
ell.stackexchange.com
Is “The empty set is a subset of any set” a convention?
1 points
e-sushi
2016-10-05T16:21:07Z
math.stackexchange.com
Is TLS secure against VM reset attacks?
2 points
e-sushi
2016-10-05T12:32:01Z
crypto.stackexchange.com
Is it OK to use a hash of the key as nonce for AES GCM?
2 points
e-sushi
2016-10-05T12:28:23Z
crypto.stackexchange.com
What Is the Purpose of the “Explicit Nonce” in TLS for AES-GCM and AES-CCM?
1 points
e-sushi
2016-10-05T12:26:32Z
crypto.stackexchange.com
30
31
32
33
34
35
36
37
38
39