- Telling Facebook you've changed your phone number
by ergot on 1/22/17, 9:15 PM, with comments
- From a fake wallet to a Java RAT
by ergot on 1/22/17, 9:13 PM, with comments
- Solar power cost down 25% in five months
by ergot on 1/22/17, 5:28 PM, with comments
- Utopian ideas on climate change will get us precisely nowhere
by ergot on 1/22/17, 5:27 PM, with comments
- Your 'anonmyized' web browsing history may not be anonymous
by ergot on 1/22/17, 5:27 PM, with comments
- Tesla Autopilot update now rolling out with new semi-autonomous features
by ergot on 1/22/17, 5:26 PM, with comments
- Mozilla's Servo Is Whooping the Other Browsers in Performance
by ergot on 1/22/17, 5:25 PM, with comments
- Being confidently programming language agnostic
by ergot on 1/22/17, 4:25 PM, with comments
- Align SVG Icons to Text and Say Goodbye to Font Icons
by ergot on 1/22/17, 3:45 PM, with comments
- Ekoparty Security Conference – 2016 Recorded Lectures (YouTube Playlist)
by ergot on 1/22/17, 3:41 PM, with comments
- Uptane – Securing Software Updates for Automobiles
by ergot on 1/22/17, 3:41 PM, with comments
- Practical Docker for Security Admins
by ergot on 1/22/17, 3:40 PM, with comments
- Docker for Automating Honeypots or Malware Sandboxes
by ergot on 1/22/17, 3:39 PM, with comments
- Technical Details of the Enigma Machine
by ergot on 1/21/17, 4:17 PM, with comments
- Full Time VPN
by ergot on 1/21/17, 1:48 PM, with comments
- A very casual introduction to Fully Homomorphic Encryption (2012)
by ergot on 1/21/17, 1:48 PM, with comments
- Surveillance Self-defense Against The Trump Administration
by ergot on 1/21/17, 1:47 PM, with comments
- Iridium Browser – A Browser Securing Your Privacy. That’s It
by ergot on 1/21/17, 1:46 PM, with comments
- Green Bank: the town that banned Wi-Fi
by ergot on 1/21/17, 1:45 PM, with comments
- The U.S. Government and Zero-Day Vulnerabilities
by ergot on 1/21/17, 1:45 PM, with comments
- CouchPotato – Download movies automatically, and in the best quality
by ergot on 1/20/17, 2:17 PM, with comments
- Little Snitch 3 – Protect your privacy
by ergot on 1/20/17, 2:16 PM, with comments
- Key rotation, user experience, and crypto reporting
by ergot on 1/20/17, 2:15 PM, with comments
- Computing Arbitrary Functions of Encrypted Data [pdf]
by ergot on 1/20/17, 2:15 PM, with comments
- NSA attacks on GCM-SIV [pdf]
by ergot on 1/20/17, 2:14 PM, with comments
- Bypassing Control Flow Guard in Windows 10
by ergot on 1/19/17, 2:51 PM, with comments
- Practical JSONP Injection
by ergot on 1/19/17, 2:50 PM, with comments
- Windows Privilege Escalation Methods for Pentesters
by ergot on 1/19/17, 2:50 PM, with comments
- Uptane – Securing Software Updates for Automobiles
by ergot on 1/19/17, 2:48 PM, with comments
- Don't use VPN services
by ergot on 1/19/17, 1:41 PM, with comments
- Elementary – A fast and open replacement for Windows and macOS
by ergot on 1/18/17, 3:52 PM, with comments
- Active Directory Lockout and Bad Password Origin Detection
by ergot on 1/18/17, 3:51 PM, with comments
- Tone.js
by ergot on 1/18/17, 3:49 PM, with comments
- The Fine yet Blurred Line Between Personalization and Privacy
by ergot on 1/18/17, 3:49 PM, with comments
- A look at how private messengers handle key changes
by ergot on 1/18/17, 3:47 PM, with comments
- The Privacy Threat from Always-On Microphones Like the Amazon Echo
by ergot on 1/18/17, 2:06 PM, with comments
- Use a ssh tunnel to create a VPN in OS X to watch country-blocked streaming
by ergot on 1/18/17, 2:04 PM, with comments