Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Notices tagged with crypto, page 15

  1. nqn1n (nqn1n)'s status on Tuesday, 09-Sep-2014 11:36:28 EDT nqn1n nqn1n
    Remote profile options...
    Leute, hier gibt es Gruppen, denen ihr folgen könnt. Z. B. !crypto - !antifa - oder !katzen und viele mehr ;-)
    Tuesday, 09-Sep-2014 11:36:28 EDT from quitter.se permalink
  2. igor (igor)'s status on Tuesday, 09-Sep-2014 09:56:32 EDT igor igor
    Remote profile options...
    • KheOps
    cc !crypto
    Tuesday, 09-Sep-2014 09:56:32 EDT from social.id-libre.org permalink
  3. gitju (gitju)'s status on Tuesday, 09-Sep-2014 01:11:34 EDT gitju gitju
    Remote profile options...
    Bonne journée !wissen !debian !crypto !qvitter !machinecoin !single !illuminati !katzen !witze !kaffee
    Tuesday, 09-Sep-2014 01:11:34 EDT from quitter.se permalink
  4. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 01-Sep-2014 19:44:09 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    @thegrugq writes "Operationally secure email is not much more difficult than normal email, it just requires a little more attention to detail, some changes to default settings, and consistent discipline." Erm, "attention to detail" and "consistent discipline" is what makes operationally secure email way too hard for most people. Never mind about the awful user interface. https://gist.github.com/grugq/03167bed45e774551155 !crypto
    Monday, 01-Sep-2014 19:44:09 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  5. pettter ✅ (pettter)'s status on Monday, 25-Aug-2014 05:41:27 EDT pettter ✅ pettter ✅
    Remote profile options...
    • lnxw48 (Linux Walt)
    I would still argue caution in using JSCrypto in general, but yes, several libraries have gone from "untested - do not use" to "has survived trials reasonably well", though none is at the "trusted" stage imo. Environment and transport is also a huge concern when it comes to JSCrypto. !crypto
    Monday, 25-Aug-2014 05:41:27 EDT from social.umeahackerspace.se permalink
  6. lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 25-Aug-2014 05:35:25 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Just a couple of years ago, everything I saw said “DANGER DO NOT USE about #JSCrypto. Now libs like this are popping up all over. http://url.federati.net/Kriw4 !crypto #keybase

    Monday, 25-Aug-2014 05:35:25 EDT from fresh.federati.net permalink
  7. Markus Kilås (netmackan)'s status on Thursday, 21-Aug-2014 16:32:32 EDT Markus Kilås Markus Kilås
    Remote profile options...
    How to exploit NSA flawed random generator in TLS !crypto http://ur1.ca/i14dd
    Thursday, 21-Aug-2014 16:32:32 EDT from quitter.se permalink
  8. Markus Kilås (netmackan)'s status on Tuesday, 19-Aug-2014 16:01:47 EDT Markus Kilås Markus Kilås
    Remote profile options...
    How to break the Internet: Cory Doctorow at TEDxOxbridge #Snowden #hollyweb !security !crypto https://www.youtube.com/watch?v=aAWCN0Jed8g
    Tuesday, 19-Aug-2014 16:01:47 EDT from quitter.se permalink
  9. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Aug-2014 22:30:04 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • aruna
    • sergiodj
    • Michael Kaulbach
    @Aruna runs the #Toronto #UbuntuHour, @Genii runs the !Ubuntuca Release Parties, we just missed the @GTALUG meeting this past Tuesday, there's the @FreeGeekToronto group that builds computers with !FreeSoftware, @HackLabTO where they do all kinds of !FreeHardware and !FreeSoftware stuff, and I want to meet with the @TorontoCrypto people who organized the !CryptoParty last month. Fo…
    Friday, 15-Aug-2014 22:30:04 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink

    Attachments

    1. -20140816T023243-x8wx5cc.html
  10. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Aug-2014 22:01:15 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    ♻ Christopher Soghoian @csoghoian: If you're using Tor on !Linux and aren't using @micahflee's Tor Browser Launcher, you're easy prey for FBI malware. https://github.com/micahflee/torbrowser-launcher/ » !crypto
    Friday, 15-Aug-2014 22:01:15 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  11. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Aug-2014 20:51:13 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • aruna
    • sergiodj
    Time to plan a joint !LibrePlanet !CryptoParty #UbuntuHour! cc/ @Aruna @TorontoCrypto !Ubuntuca
    Friday, 15-Aug-2014 20:51:13 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  12. Markus Kilås (netmackan)'s status on Wednesday, 13-Aug-2014 17:16:05 EDT Markus Kilås Markus Kilås
    Remote profile options...
    #Maven still runs insecure binaries directly off the net by default !crypto !security http://ur1.ca/hywne http://ur1.ca/huuio
    Wednesday, 13-Aug-2014 17:16:05 EDT from quitter.se permalink
  13. morph (morph)'s status on Tuesday, 12-Aug-2014 04:30:50 EDT morph morph
    Remote profile options...
    • aqeeliz
    @aqeeliz I must say I haven’t tried any of the plenty upcoming new secure messengers for several reasons. Just BitMessage so far which lacks a mobile client. The TOX seems interesting. It is decentralized and the project’s websites try to offer information about it while others just have cute graphics and point out that their application is “secure”.
    Tuesday, 12-Aug-2014 04:30:50 EDT from micro.morphtown.de at 49°27'15"N 11°4'39"E permalink
  14. aqeeliz (aqeeliz)'s status on Tuesday, 12-Aug-2014 03:28:44 EDT aqeeliz aqeeliz
    Remote profile options...
    Has anyone here tried Tox? http://tox.im !crypto
    Tuesday, 12-Aug-2014 03:28:44 EDT from micro.fragdev.com at 31°32'58"N 74°20'36"E permalink
  15. qbi (qbi)'s status on Tuesday, 05-Aug-2014 18:37:32 EDT qbi qbi
    Remote profile options...
    Malicious SHA-1: https://malicioussha1.github.io/ von @veorq und anderen !crypto #hash #MalSHA1
    Tuesday, 05-Aug-2014 18:37:32 EDT from quitter.se permalink
  16. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 04-Aug-2014 13:59:27 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    I stopped reading about halfway through because it was all speculation and conjecture lacking any evidence at all http://miniver.blogspot.co.uk/2014/07/how-secure-is-tor.html #TOR !Crypto !surveillance
    Monday, 04-Aug-2014 13:59:27 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  17. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 04-Aug-2014 13:41:30 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Luke
    I read this yesterday, and I've been thinking about it. Nothing new for those of us who've been following #TOR for some time. But I'm a little surprised at the glibness the article attributes to Roger Dingledine http://pando.com/2014/07/16/tor-spooks/ !crypto !surveillance
    Monday, 04-Aug-2014 13:41:30 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  18. zoowar (zoowar)'s status on Wednesday, 30-Jul-2014 11:44:46 EDT zoowar zoowar
    Remote profile options...
    Tor security advisory: "relay early" traffic confirmation attack !crypto !darknet https://indy.im/url/5761678
    Wednesday, 30-Jul-2014 11:44:46 EDT from indy.im permalink
  19. Markus Kilås (netmackan)'s status on Monday, 28-Jul-2014 12:46:50 EDT Markus Kilås Markus Kilås
    Remote profile options...
    Do Government Websites Care About HTTPS? Not in 2010, wonder if it is better now? #ssl #tls !crypto #infosec https://t.co/id4ViuvhFk
    Monday, 28-Jul-2014 12:46:50 EDT from quitter.se permalink
  20. kat (boneidol)'s status on Saturday, 26-Jul-2014 16:54:12 EDT kat kat
    Remote profile options...
    awesome #fail !crypto http://www.cryptofails.com/post/87697461507/46esab-high-quality-cryptography-direct-from-linkedin
    Saturday, 26-Jul-2014 16:54:12 EDT from indy.im at 32°58'59"N 49°7'59"E permalink
  • After
  • Before
Start the article for #crypto on WikiHashtags

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.