SSH for Fun and Profit edit / delete

Writing an SSH client from scratch.

to cryptography python ssh ... on 06 December 2016

Articles on Historical Cryptography edit / delete

Going back to the 16th century. Lots of interesting stuff here.

to code cryptography history security ... on 20 November 2015

Ciphers By Ritter: Cryptography and Technology edit / delete

Various crypto stuff, with some interesting (Usenet-sourced) comments on RNGs.

to cryptography random rng ... on 03 May 2015

NX Crypto Photography edit / delete

"After Samsung released the NX300, and after it had been easily rooted, I bought one. It's a nice well-rounded camera in a reasonable price range. It runs Linux, and is somewhat open-sourced by Samsung." Hm. Something to bear in mind when I'm next looking for a camera...

to camera cryptography photography reverse-engineering ... on 22 March 2015

tedu/reop ยท GitHub edit / delete

A simple GPG-like tool: message signing and encryption.

to cryptography encryption gpg pgp software ... on 22 March 2015

The Update Framework (TUF) edit / delete

"The Update Framework (TUF) helps developers secure their new or existing software update systems." A framework for signing package updates.

to cryptography garstow packaging signature update ... on 20 January 2015

C3TV - Crypto Tales from the Trenches edit / delete

A group of journalists talk about how cryptography is useful to them -- and why it's a royal pain to use for the people they talk to. It's very encouraging to hear about the tools they use.

to ccc cryptography gpg journalism security tor whistleblowing ... on 18 January 2015

Why King George III Can Encrypt edit / delete

Coming up with better metaphors for how PGP signing and encryption works, and then *actually evaluating how effective they are with users*. The short answer: key/lock, seal/imprint. And tell a story about them.

to cryptography encryption gpg metaphors papers pgp security teaching ... on 18 January 2015

Frode Weierud's CryptoCellar edit / delete

Lots of Enigma-related stuff, including some finds of undecrypted messages and a good description of how to break it using modern statistical methods.

to cryptography enigma history ww2 ... on 17 January 2015

Enigma Cipher Machine edit / delete

With lots of pictures of the original hardware.

to cryptography enigma history mechanica ww2 ... on 17 January 2015

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom