« earlier | later » Page 1 of 5
SSH for Fun and Profit edit / delete
Writing an SSH client from scratch.
to cryptography python ssh ... on 06 December 2016
Articles on Historical Cryptography edit / delete
Going back to the 16th century. Lots of interesting stuff here.
to code cryptography history security ... on 20 November 2015
Ciphers By Ritter: Cryptography and Technology edit / delete
Various crypto stuff, with some interesting (Usenet-sourced) comments on RNGs.
to cryptography random rng ... on 03 May 2015
NX Crypto Photography edit / delete
"After Samsung released the NX300, and after it had been easily rooted, I bought one. It's a nice well-rounded camera in a reasonable price range. It runs Linux, and is somewhat open-sourced by Samsung." Hm. Something to bear in mind when I'm next looking for a camera...
to camera cryptography photography reverse-engineering ... on 22 March 2015
tedu/reop ยท GitHub edit / delete
A simple GPG-like tool: message signing and encryption.
to cryptography encryption gpg pgp software ... on 22 March 2015
The Update Framework (TUF) edit / delete
"The Update Framework (TUF) helps developers secure their new or existing software update systems." A framework for signing package updates.
to cryptography garstow packaging signature update ... on 20 January 2015
C3TV - Crypto Tales from the Trenches edit / delete
A group of journalists talk about how cryptography is useful to them -- and why it's a royal pain to use for the people they talk to. It's very encouraging to hear about the tools they use.
to ccc cryptography gpg journalism security tor whistleblowing ... on 18 January 2015
Why King George III Can Encrypt edit / delete
Coming up with better metaphors for how PGP signing and encryption works, and then *actually evaluating how effective they are with users*. The short answer: key/lock, seal/imprint. And tell a story about them.
to cryptography encryption gpg metaphors papers pgp security teaching ... on 18 January 2015
Frode Weierud's CryptoCellar edit / delete
Lots of Enigma-related stuff, including some finds of undecrypted messages and a good description of how to break it using modern statistical methods.
to cryptography enigma history ww2 ... on 17 January 2015
Enigma Cipher Machine edit / delete
With lots of pictures of the original hardware.
to cryptography enigma history mechanica ww2 ... on 17 January 2015
« earlier | later » Page 1 of 5
tasty by Adam Sampson.