Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Why You Should Care About CHERI [pdf] (links.org)
3 points by ksec on Dec 25, 2022 | past
Distributed Verifiable Ledgers: A Framework [pdf] (links.org)
2 points by edward on Jan 18, 2018 | past
The NIST Conspiracy (2012) (links.org)
1 point by libeclipse on March 6, 2017 | past
What is SHA-3 good for? (links.org)
5 points by robinhouston on Oct 4, 2012 | past
Verifiable Logs: Solving The “Cryptocat Problem” (links.org)
1 point by xorbyte on Aug 15, 2012 | past
Using Capsicum For Sandboxing (links.org)
16 points by there on April 28, 2012 | past | 3 comments
Certificate Transparency: Spec and Working Code (links.org)
1 point by robinhouston on March 1, 2012 | past
How “Free” Leads to Closed (links.org)
1 point by robinhouston on March 1, 2012 | past
MD5 Collisions, Visualized (links.org)
2 points by mef on Nov 28, 2011 | past
An Efficient and Practical Distributed Currency (links.org)
3 points by skybrian on July 23, 2011 | past
Decentralised Currencies Are Probably Impossible (links.org)
4 points by joewalnes on July 2, 2011 | past | 2 comments
Ben Laurie on Bitcoin (links.org)
18 points by davidw on May 17, 2011 | past | 13 comments
Completely Redundant Disks with ZFS and FreeBSD (links.org)
2 points by cannedprimates on March 18, 2011 | past
Is OpenLeaks the next Haystack? (links.org)
1 point by robinhouston on Dec 21, 2010 | past
On Diaspora and Haystack and their Flaws (links.org)
6 points by kes on Sept 26, 2010 | past
Stupid: A Metalanguage For Cryptography (links.org)
3 points by MaysonL on May 19, 2010 | past
Nigori: Storing Secrets in the Cloud (links.org)
2 points by sweis on May 18, 2010 | past | 1 comment
Capability Operating Systems (links.org)
19 points by davidw on March 28, 2010 | past | 1 comment
Writing Compilers Quickly (links.org)
31 points by r11t on Feb 5, 2010 | past | 22 comments
Intent Is The Problem (links.org)
1 point by davidw on Dec 6, 2009 | past
Another Protocol Bites The Dust (links.org)
2 points by there on Nov 5, 2009 | past
SeL4 (links.org)
1 point by davidw on Sept 23, 2009 | past
Porting Chromium to FreeBSD (links.org)
23 points by baha_man on Sept 3, 2009 | past | 3 comments
Who Pwns the Internet? A map of TLD dependencies (links.org)
14 points by sweis on June 14, 2009 | past
Do Passwords Scale? (links.org)
5 points by davidw on Nov 26, 2008 | past | 2 comments
You Need Delegation, Too (links.org)
1 point by davidw on Nov 20, 2008 | past
Identification Is Not Security (links.org)
1 point by davidw on Nov 17, 2008 | past
WTF Does Open Source Have To Do With Business Models? (links.org)
2 points by davidw on Oct 24, 2008 | past
The Neb, a hypothetical secure dongle for unphishable ecommerce (links.org)
1 point by wmf on June 3, 2008 | past
MD5 Collisions, Visualised (links.org)
2 points by nickb on May 29, 2008 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: