Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Notices tagged with crypto, page 20

  1. Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 19:15:42 EST Joshua Judson Rosen Joshua Judson Rosen
    • kat
    @boneidol, something like that: https://en.wikipedia.org/wiki/Birthday_attack#Mathematics !crypto
    Sunday, 02-Mar-2014 19:15:42 EST from web permalink
  2. kat (boneidol)'s status on Sunday, 02-Mar-2014 19:03:32 EST kat kat
    Remote profile options...
    • Joshua Judson Rosen
    so 8 hex digits is a 2^32 space, so 50% chance of collision is ~ 2^16, 1 in 65536 ?
    Sunday, 02-Mar-2014 19:03:32 EST from indy.im at 32°58'59"N 49°7'59"E permalink
  3. Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 16:47:52 EST Joshua Judson Rosen Joshua Judson Rosen
    • kat
    #git practically advocates abbreviating SHA-1 !crypto hashes to 7 hexits; #redmine habitually abbreviates them to 8; somehow this never collides with the notion that "the unlikelihood of hash-collisions is astronomical because it's SHA-1".
    Sunday, 02-Mar-2014 16:47:52 EST from web permalink
  4. Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 16:40:39 EST Joshua Judson Rosen Joshua Judson Rosen
    • kat
    For every person who understands all of the implications of abbreviating a !crypto #hash, I wouldn't be surprised if there are a million who can't imagine there's any problem.
    Sunday, 02-Mar-2014 16:40:39 EST from web permalink
  5. kat (boneidol)'s status on Sunday, 02-Mar-2014 16:04:07 EST kat kat
    Remote profile options...
    • Joshua Judson Rosen
    if you truncate the checksum collisions will happen sooner.
    Sunday, 02-Mar-2014 16:04:07 EST from indy.im at 32°58'59"N 49°7'59"E permalink
  6. Joshua Judson Rosen (rozzin)'s status on Sunday, 02-Mar-2014 15:18:51 EST Joshua Judson Rosen Joshua Judson Rosen
    The #problem w/ #checksum as #ID: users need basic understanding of the nature of a !crypto #hash. http://status.hackerposse.com/url/5412
    Sunday, 02-Mar-2014 15:18:51 EST from web permalink
  7. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 24-Feb-2014 20:34:54 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    ♻ John Adams ‏@netik: "We don't understand strong !crypto, so let's run a new cable." DERP. http://www.reuters.com/article/2014/02/24/us-eu-brazil-idUSBREA1N0PL20140224 » !surveillance , via Christopher Soghoian @csoghoian
    Monday, 24-Feb-2014 20:34:54 EST from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  8. Joshua Judson Rosen (rozzin)'s status on Friday, 21-Feb-2014 21:31:41 EST Joshua Judson Rosen Joshua Judson Rosen
    • Rob Myers
    I like @robmyers' post about !crypto #sigils: http://robmyers.org/2014/02/07/crypto-sigils/ !visualids
    Friday, 21-Feb-2014 21:31:41 EST from web permalink
  9. kat (boneidol)'s status on Friday, 21-Feb-2014 13:38:52 EST kat kat
    Remote profile options...
    The !crypto at telegram has been questioned. http://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest but so has whatsapp. Both seem equally shit to me
    Friday, 21-Feb-2014 13:38:52 EST from indy.im at 32°58'59"N 49°7'59"E permalink
  10. qbi (qbi)'s status on Wednesday, 19-Feb-2014 05:46:01 EST qbi qbi
    Remote profile options...
    • datenkanal
    Die Audiodateien vom letzten @datenkanal hatten einen Fehler. Der ist jetzt korrigiert: http://yaturl.net/b35c #passwort !security !crypto
    Wednesday, 19-Feb-2014 05:46:01 EST from quitter.se permalink
  11. kuro (kuro)'s status on Tuesday, 18-Feb-2014 03:56:11 EST kuro kuro
    Remote profile options...
    Die Liste ist wieder ein wenig länger: http://qttr.at/c2x #SSL !crypto
    Tuesday, 18-Feb-2014 03:56:11 EST from quitter.se permalink
  12. kuro (kuro)'s status on Tuesday, 18-Feb-2014 03:35:42 EST kuro kuro
    Remote profile options...
    • datenkanal
    ♻ @datenkanal Wie werden Passwörter gespeichert? http://yaturl.net/b35c Podcast mit Prof.Lucks @bauhaus_uni !security !crypto !ccc #pbkdf2
    Tuesday, 18-Feb-2014 03:35:42 EST from quitter.se permalink
  13. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 17-Feb-2014 05:36:46 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • aqeeliz
    I'll give KeepassX another try, this time the v2alpha version https://www.keepassx.org/news/2013/12/420 !crypto !security !infosec
    Monday, 17-Feb-2014 05:36:46 EST from sn.jonkman.ca permalink
  14. aqeeliz (aqeeliz)'s status on Monday, 17-Feb-2014 04:47:08 EST aqeeliz aqeeliz
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    • lnxw48 (Linux Walt)
    @lnxw48 @bobjonkman There is a new #KeepassX version in works (alpha currently) that is compatible with #Keepass v 2, and it's stable enough.
    Monday, 17-Feb-2014 04:47:08 EST from micro.fragdev.com at 31°32'58"N 74°20'36"E permalink
  15. lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 17-Feb-2014 04:36:53 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca

    @bobjonkman ... It has been some time since I’ve used or even seen #Lastpass, so I can’t offer any insight.

    Monday, 17-Feb-2014 04:36:53 EST from fresh.federati.net permalink
  16. lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 17-Feb-2014 04:35:40 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca

    @bobjonkman #Keepass v.1.x does not need Mono, and it is the version that #KeepassX, #KeepassDroid, etc are compatible with.

    Monday, 17-Feb-2014 04:35:40 EST from fresh.federati.net permalink
  17. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 17-Feb-2014 04:09:17 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Temporary Marjolein
    Got some interesting discussion going on the KW !Crypto mailing list: http://thread.gmane.org/gmane.comp.cryptography.kwcrypto/2
    Monday, 17-Feb-2014 04:09:17 EST from sn.jonkman.ca permalink
  18. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 10-Feb-2014 15:31:12 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    !Cryptoparty for a GnuPG/PGP keysiging at @GTALUG tomorrow: http://gtalug.org/keysigning/
    Monday, 10-Feb-2014 15:31:12 EST from sn.jonkman.ca permalink
  19. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 09-Feb-2014 18:55:41 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • zoowar
    The only time self-signed certificates are insecure is if you don't verify the certificate signature. It is always necessary to verify a certificate's signature out-of-band. Usually that's done by a Certificate Authority (with pre-defined CA certs bundled with the browser), but certificate signatures can also be verified through other secure channels, eg. In-person, GnuPG message, …
    Sunday, 09-Feb-2014 18:55:41 EST from sn.jonkman.ca permalink

    Attachments

    1. bobjonkman-20140209T235643-7a4vqmh.html
  20. kat (boneidol)'s status on Saturday, 08-Feb-2014 07:37:51 EST kat kat
    Remote profile options...
    Free book on !crypto http://cacr.uwaterloo.ca/hac/ "Handbook of Applied Cryptology"
    Saturday, 08-Feb-2014 07:37:51 EST from indy.im at 32°58'59"N 49°7'59"E permalink
  • After
  • Before
Start the article for #crypto on WikiHashtags

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.