Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Notices tagged with crypto, page 28

  1. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 29-Oct-2013 21:18:18 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Mikael
    No no no. Using government issued ID undermines the whole idea of the #WebOfTrust http://bob.jonkman.ca/blogs/2011/10/14/how-to-hold-a-key-signing-party/ !crypto
    Tuesday, 29-Oct-2013 21:18:18 EDT from sn.jonkman.ca permalink
  2. mcscx (mcscx)'s status on Sunday, 27-Oct-2013 07:15:07 EDT mcscx mcscx
    Remote profile options...
    ...this could be an interesting reception device for ppl who try to hack / crack / break #GSM mobile phone network etc. !crypt !crypto
    Sunday, 27-Oct-2013 07:15:07 EDT from quitter.se permalink
  3. qbi (qbi)'s status on Saturday, 26-Oct-2013 18:17:00 EDT qbi qbi
    Remote profile options...
    Timing Attacks on ECDSA, ECDHE, AES and SHA2 http://crypto.stackexchange.com/q/11300/320?stw=2 !crypto !math
    Saturday, 26-Oct-2013 18:17:00 EDT from quitter.se permalink
  4. zoowar (zoowar)'s status on Friday, 25-Oct-2013 22:42:56 EDT zoowar zoowar
    Remote profile options...
    Ten Steps You Can Take Right Now Against Internet Surveillance !crypto !darknet https://indy.im/url/5755591
    Friday, 25-Oct-2013 22:42:56 EDT from indy.im permalink
  5. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 24-Oct-2013 15:15:41 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    !Crypto seminar on "Practical TOR Usage" by UofW CSClub's Simon Gladstone at 6:30pm http://csclub.uwaterloo.ca/events/DC_1302-2013-10-24-6:30PM
    Thursday, 24-Oct-2013 15:15:41 EDT from sn.jonkman.ca permalink
  6. Joshua Judson Rosen (rozzin)'s status on Wednesday, 23-Oct-2013 14:21:50 EDT Joshua Judson Rosen Joshua Judson Rosen
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    I like the idea of e-mail clients offering to teach their users about !crypto, but... it reminds me too much of a suggestion that someone made that clocks should pop up a treatise on time-standards whenever users set the clock to "12:00"....
    Wednesday, 23-Oct-2013 14:21:50 EDT from web permalink
  7. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 23-Oct-2013 01:15:14 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    Hauke Laging advocates a "Crypto" button in KMail that directs people to a !crypto learning site if no crypto plugin is configured https://bugs.kde.org/show_bug.cgi?id=326476 Good idea for other distros and applications, too! http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
    Wednesday, 23-Oct-2013 01:15:14 EDT from sn.jonkman.ca permalink
  8. qbi (qbi)'s status on Tuesday, 22-Oct-2013 08:31:27 EDT qbi qbi
    Remote profile options...
    Elliptische Kurven und anderes sind nicht immer eine gute Idee: http://yaturl.net/ab8 !crypto via @matthew_d_green @koolfy
    Tuesday, 22-Oct-2013 08:31:27 EDT from quitter.se permalink
  9. qbi (qbi)'s status on Wednesday, 16-Oct-2013 17:44:14 EDT qbi qbi
    Remote profile options...
    Hadamard-Matrizen spielen in der Kryptrografie eine größere Rolle, als mir bislang bewusst war. !crypto !math
    Wednesday, 16-Oct-2013 17:44:14 EDT from quitter.se permalink
  10. kat (boneidol)'s status on Monday, 14-Oct-2013 03:21:15 EDT kat kat
    Remote profile options...
    • Joshua Judson Rosen
    Not sure I quite recognise rip van cypherpunks present. Lots of poor TLS implementation. No trusted cipher suites. Rc4 broken, short keylengths...
    Monday, 14-Oct-2013 03:21:15 EDT from indy.im permalink
  11. Joshua Judson Rosen (rozzin)'s status on Sunday, 13-Oct-2013 23:54:48 EDT Joshua Judson Rosen Joshua Judson Rosen
    #Cypherpunks 2.0: http://adi.is/s/cpunk20/
    Sunday, 13-Oct-2013 23:54:48 EDT from web permalink
  12. Joshua Judson Rosen joined the group Cryptography.
    Sunday, 13-Oct-2013 23:53:41 EDT from activity permalink
  13. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 07-Oct-2013 02:40:37 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Kitchener Waterloo Linux User Group
    Looks like we'll have a GnuPG/PGP keysigning party at the @KWLUG meeting tomorrow: http://kwlug.org/pipermail/kwlug-disc_kwlug.org/2013-October/011000.html !crypto
    Monday, 07-Oct-2013 02:40:37 EDT from sn.jonkman.ca permalink
  14. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 02-Oct-2013 16:36:28 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    If NSA can crack 1024 bit RSA/DH encryption in Tor, are GnuPG 1024 bit keys also vulnerable? !crypto !infosec http://techcrunch.com/2013/09/07/the-nsa-can-read-some-encrypted-tor-traffic/
    Wednesday, 02-Oct-2013 16:36:28 EDT from sn.jonkman.ca permalink
  15. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 27-Sep-2013 04:05:35 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Erkan Yılmaz
    • Temporary Marjolein
    @erkanyilmaz probably means "Perfect Forward Secrecy", where compromising a key doesn't reveal past correspondence https://en.wikipedia.org/wiki/Perfect_forward_secrecy !crypto
    Friday, 27-Sep-2013 04:05:35 EDT from sn.jonkman.ca permalink
  16. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 27-Sep-2013 03:50:51 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Luke
    I'll help you test GnuPG: http://sobac.com/bjonkman/pgpkey.htm !crypto
    Friday, 27-Sep-2013 03:50:51 EDT from sn.jonkman.ca permalink
  17. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 08-Sep-2013 04:53:00 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • eniac
    I think we've seen this link, but I want to pop the conversation into the !crypto group ♻ @eniac@sn.ilikefreedom.ro: [#Cryptography] Opening Discussion: Speculation on #BULLRUN http://ur1.ca/ff2av !vivalafederation !statusnet !ufos !infosec
    Sunday, 08-Sep-2013 04:53:00 EDT from sn.jonkman.ca permalink
  18. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 08-Sep-2013 04:51:12 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • eniac
    I think we've seen this link, but I want to pop the conversation into the !crypto group ♻ @eniac@sn.ilikefreedom.ro
    Sunday, 08-Sep-2013 04:51:12 EDT from sn.jonkman.ca permalink
  19. Joshua Judson Rosen (rozzin)'s status on Friday, 06-Sep-2013 10:08:47 EDT Joshua Judson Rosen Joshua Judson Rosen
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    @bobjonkman, there are ways of ensuring that there is no MITM with self-signed #crypto certs. You just need a trustworthy way of doing the initial cert-exchange, like in-person or via a trusted courier (which is what the certificate-authorities are supposed to be).
    Friday, 06-Sep-2013 10:08:47 EDT from web permalink
  20. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 06-Sep-2013 02:21:37 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Erkan Yılmaz
    corr'n: How will #OpenPGPjs be any better or more secure than #Cryptocat? Javascript encryption has been criticized as impossible to do securely !crypto
    Friday, 06-Sep-2013 02:21:37 EDT from sn.jonkman.ca permalink
  • After
  • Before
Start the article for #crypto on WikiHashtags

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.