« earlier | later » Page 1 of 4
WireGuard: fast, modern, secure VPN tunnel edit / delete
VPN protocol based on Noise and straightforward public/private key mappings -- I rather like this design.
to crypto networking noise security vpn ... on 15 September 2016
Cracking the Agrippa Code edit / delete
Reverse-engineering William Gibson's "Agrippa", a poem published on a self-erasing disk.
to crypto mac reverse-engineering william-gibson ... on 27 August 2016
Things that use Ed25519 edit / delete
An interesting list. (Of course, the analogous "things that use RSA/AES" would be much longer...)
Password Hashing Competition edit / delete
Which these days is mostly about the winner, Argon2.
Gnuk Documentation — Gnuk Documentation 1.0 documentation edit / delete
Free software DIY crypto-token.
to authentication crypto microcontroller token ... on 21 June 2016
Not A Number - Painless IPSec setup for a home network. edit / delete
A script to automate ipsec with static keys. Neat -- it takes surprisingly little code.
waywardgeek/infnoise · GitHub edit / delete
Generating random numbers by analogue modular multiplication and feedback. Neat idea. (And should be easy to hack together using a FET-input op-amp and an Arduino board for the FTDI chip...)
to crypto electronics noise random rng ... on 05 March 2015
Vulnerability: Infiltrating a network via Powerline (HomePlugAV) adapters - www.bentasker.co.uk edit / delete
Attacking HomePlugAV devices (not all of them, but a large subset). It's a key distribution problem.
to crypto homeplugav networking security ... on 18 January 2015
QuickTun - Qontrol.nl Wiki edit / delete
Interface-level tunnelling using NaCl for security.
to crypto ip nacl networking tunnel ... on 22 July 2014
« earlier | later » Page 1 of 4
- crypto | |
1 | + ag0803 |
2 | + api |
1 | + argon2 |
1 | + authentication |
1 | + autoconf |
1 | + book |
1 | + braid |
1 | + ca |
1 | + constant-time |
5 | + djb |
1 | + dns |
1 | + dump |
1 | + ecc |
1 | + ed25519 |
2 | + electronics |
1 | + enigma |
1 | + gpg |
1 | + gsm |
1 | + hash |
1 | + hashing |
2 | + history |
1 | + homeplugav |
1 | + ip |
1 | + ipsec |
1 | + linux |
1 | + mac |
4 | + maths |
1 | + microcontroller |
1 | + monitoring |
6 | + nacl |
3 | + network |
7 | + networking |
2 | + noise |
2 | + packet |
1 | + password |
1 | + perl |
1 | + phone |
2 | + programming |
1 | + protocol-design |
1 | + protocols |
2 | + python |
1 | + radio |
2 | + random |
2 | + research |
1 | + retrocomputing |
1 | + retrotech |
1 | + reverse-engineering |
1 | + rng |
10 | + security |
5 | + software |
1 | + ssh |
2 | + ssl |
1 | + systems |
2 | + tcp |
1 | + teaching |
1 | + tls |
1 | + token |
2 | + tunnel |
1 | + tutorial |
1 | + usability |
1 | + usable-security |
1 | + vcr |
1 | + video |
1 | + vpn |
1 | + web |
1 | + william-gibson |
1 | + ww2 |
tasty by Adam Sampson.