Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Notices tagged with crypto, page 25

  1. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 28-Nov-2013 01:11:00 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    I think the slides for my !Crypto presentation at !KWLUG next Monday are finally done: http://sobac.com/kwcrypto/kwlug-2013-12-02/
    Thursday, 28-Nov-2013 01:11:00 EST from sn.jonkman.ca permalink
  2. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 26-Nov-2013 16:23:50 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    On my way to the last UofW CSClub !Security and !Privacy lecture on Disk !Crypto https://csclub.uwaterloo.ca/events/MC_2038-2013-11-26-5:00PM
    Tuesday, 26-Nov-2013 16:23:50 EST from sn.jonkman.ca permalink
  3. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Saturday, 23-Nov-2013 03:06:28 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    !Microsoft Office365 to encrypt e-mail — but who will be able to decrypt it? !Surveillance? Will it be an open !crypto standard? Using !FreeSoftware? http://thenextweb.com/microsoft/2013/11/22/starting-early-2014-you-can-send-encrypted-emails-in-microsoft-office-365-to-anyone/
    Saturday, 23-Nov-2013 03:06:28 EST from sn.jonkman.ca permalink
  4. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 22-Nov-2013 19:09:47 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Dennis
    Adding this to the !crypto group… ♻ @dennisgut NTRU public key crypto released to the free and open source community #RSA and #ECC are the two most common public-key crypto systems in use today. At the 2013 Black Hat conference, researchers declared that the math for cracking #encryption algorithms could soon become so efficient that it will render the RSA crypto #algorithm obsolete. http://www.net-security.org/secworld.php?id=15997
    Friday, 22-Nov-2013 19:09:47 EST from sn.jonkman.ca permalink
  5. kat (boneidol)'s status on Friday, 22-Nov-2013 12:49:30 EST kat kat
    Remote profile options...
    • Dennis
    http://en.m.wikipedia.org/wiki/NTRU resistant to quantum !crypto attacks
    Friday, 22-Nov-2013 12:49:30 EST from indy.im permalink
  6. zoowar (zoowar)'s status on Wednesday, 20-Nov-2013 12:11:28 EST zoowar zoowar
    Remote profile options...
    Encrypt the Web Report: Who's Doing What !crypto https://indy.im/url/5756956
    Wednesday, 20-Nov-2013 12:11:28 EST from indy.im permalink
  7. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 19-Nov-2013 21:25:06 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    @TorontoCrypto Where can we get more info? location, time, &c. Don't see anything on https://torontocrypto.org/ !crypto #cryptoparty
    Tuesday, 19-Nov-2013 21:25:06 EST from sn.jonkman.ca permalink
  8. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 19-Nov-2013 19:39:03 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • John Sullivan
    • Free Software Foundation
    @fsf, @johns You should add the Lowell #Cryptoparty to https://www.cryptoparty.in/parties/upcoming !crypto https://www.fsf.org/events/20131123-lowell
    Tuesday, 19-Nov-2013 19:39:03 EST from sn.jonkman.ca permalink
  9. kat (boneidol)'s status on Sunday, 17-Nov-2013 09:38:04 EST kat kat
    Remote profile options...
    Short http://www.bbc.co.uk/programmes/p01kxldh BBC world service show about security, NSA #snowden and importance of open source in !crypto
    Sunday, 17-Nov-2013 09:38:04 EST from indy.im permalink
  10. kat (boneidol)'s status on Friday, 15-Nov-2013 09:52:59 EST kat kat
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    The Debian administration article mentions a phased transition to a new key over 3 months. Getting your new key signed by the old one. Attending key signings to get it integrated into the WoT, and contacting people who's keys you've signed to check they are still in control of their keys so you can recertify them with your new key.
    Friday, 15-Nov-2013 09:52:59 EST from indy.im permalink
  11. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Nov-2013 01:17:38 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • kat
    @boneidol Thanx! I've done mostly that, except for the descending order of SHA strength (/me fixes that now). And since my key is DSA, I guess I should generate a new keypair. If I don't revoke the old key, but expire it so that its Web of Trust stays intact, does that weaken the WoT? !crypto
    Friday, 15-Nov-2013 01:17:38 EST from sn.jonkman.ca permalink
  12. kat (boneidol)'s status on Thursday, 14-Nov-2013 04:57:44 EST kat kat
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    try this from 2009. http://www.debian-administration.org/users/dkg/weblog/48
    Thursday, 14-Nov-2013 04:57:44 EST from indy.im permalink
  13. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 14-Nov-2013 02:52:20 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • lnxw37 (lnxwalt on quitter)
    Checked my prefs in GnuPG with "gpg --edit-key bjonkman" then "showprefs"; SHA1 was the only digest algorithm listed. Issued command "setpref" to set all algorithms to default, but SHA1 was listed first. Issued command "setpref CAST5 3DES IDEA AES256 AES192 AES SHA256 SHA384 SHA512 SHA224 ZLIB BZIP2 ZIP Uncompressed MDC" to remove SHA1, but GnuPG added it back, now listed last. !crypto https://www.schneier.com/blog/archives/2013/11/microsoft_retir.html
    Thursday, 14-Nov-2013 02:52:20 EST from sn.jonkman.ca permalink
  14. zoowar (zoowar)'s status on Wednesday, 13-Nov-2013 19:49:45 EST zoowar zoowar
    Remote profile options...
    The RC5 Encryption Algorithm !crypto http://people.csail.mit.edu/rivest/Rivest-rc5.pdf
    Wednesday, 13-Nov-2013 19:49:45 EST from indy.im permalink
  15. zoowar (zoowar)'s status on Wednesday, 13-Nov-2013 12:40:07 EST zoowar zoowar
    Remote profile options...
    Moving forward on improving HTTP's security !crypto https://indy.im/url/5756539
    Wednesday, 13-Nov-2013 12:40:07 EST from indy.im permalink
  16. kat (boneidol)'s status on Wednesday, 13-Nov-2013 09:20:51 EST kat kat
    Remote profile options...
    Microsoft recommend disabling RC4 in !crypto https://blogs.technet.com/b/srd/archive/2013/11/12/security-advisory-2868725-recommendation-to-disable-rc4.aspx?Redirected=true
    Wednesday, 13-Nov-2013 09:20:51 EST from indy.im permalink
  17. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 12-Nov-2013 03:46:44 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    Impressive list of speakers for the London !Crypto Festival https://www.cryptoparty.in/london_cryptofestival/schedule
    Tuesday, 12-Nov-2013 03:46:44 EST from sn.jonkman.ca permalink
  18. kat (boneidol)'s status on Monday, 11-Nov-2013 14:57:43 EST kat kat
    Remote profile options...
    This is the answer ... https://indy.im/file/boneidol-20131102T162730-nd6wqll.jpeg Though there is a stupid mistake earlier on the page
    Monday, 11-Nov-2013 14:57:43 EST from indy.im permalink
  19. kat (boneidol)'s status on Monday, 11-Nov-2013 14:51:49 EST kat kat
    Remote profile options...
    Here's an example ...."An attacker intercepts the following ciphertext (hex encoded): 20814804c1767293b99f1d9cab3bc3e7 ac1e37bfb15599e5f40eef805488281d He knows that the plaintext is the ASCII encoding of the message "Pay Bob 100$" (excluding the quotes). He also knows that the cipher used is CBC encryption with a random IV using AES as the underlying block cipher. Show that th…
    Monday, 11-Nov-2013 14:51:49 EST from indy.im permalink

    Attachments

    1. -20131111T200615-smq6hc3.html
  20. kat (boneidol)'s status on Monday, 11-Nov-2013 14:50:19 EST kat kat
    Remote profile options...
    https://www.coursera.org/course/crypto course is starting again in January ... I crammed and passed it in 2 weeks. I quite enjoyed it, and got a good understanding of the !crypto primitives I use every day... Because I crammed it missed out some of the optional programming questions. So I may well do it again.
    Monday, 11-Nov-2013 14:50:19 EST from indy.im permalink
  • After
  • Before
Start the article for #crypto on WikiHashtags

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.