Notices tagged with crypto, page 28
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 29-Oct-2013 21:18:18 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca No no no. Using government issued ID undermines the whole idea of the #WebOfTrust http://bob.jonkman.ca/blogs/2011/10/14/how-to-hold-a-key-signing-party/ !crypto -
mcscx (mcscx)'s status on Sunday, 27-Oct-2013 07:15:07 EDT mcscx ...this could be an interesting reception device for ppl who try to hack / crack / break #GSM mobile phone network etc. !crypt !crypto -
qbi (qbi)'s status on Saturday, 26-Oct-2013 18:17:00 EDT qbi Timing Attacks on ECDSA, ECDHE, AES and SHA2 http://crypto.stackexchange.com/q/11300/320?stw=2 !crypto !math -
zoowar (zoowar)'s status on Friday, 25-Oct-2013 22:42:56 EDT zoowar Ten Steps You Can Take Right Now Against Internet Surveillance !crypto !darknet https://indy.im/url/5755591 -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 24-Oct-2013 15:15:41 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca !Crypto seminar on "Practical TOR Usage" by UofW CSClub's Simon Gladstone at 6:30pm http://csclub.uwaterloo.ca/events/DC_1302-2013-10-24-6:30PM -
Joshua Judson Rosen (rozzin)'s status on Wednesday, 23-Oct-2013 14:21:50 EDT Joshua Judson Rosen I like the idea of e-mail clients offering to teach their users about !crypto, but... it reminds me too much of a suggestion that someone made that clocks should pop up a treatise on time-standards whenever users set the clock to "12:00".... -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 23-Oct-2013 01:15:14 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Hauke Laging advocates a "Crypto" button in KMail that directs people to a !crypto learning site if no crypto plugin is configured https://bugs.kde.org/show_bug.cgi?id=326476 Good idea for other distros and applications, too! http://userbase.kde.org/Concepts/OpenPGP_Help_Spread -
qbi (qbi)'s status on Tuesday, 22-Oct-2013 08:31:27 EDT qbi Elliptische Kurven und anderes sind nicht immer eine gute Idee: http://yaturl.net/ab8 !crypto via @matthew_d_green @koolfy -
qbi (qbi)'s status on Wednesday, 16-Oct-2013 17:44:14 EDT qbi Hadamard-Matrizen spielen in der Kryptrografie eine größere Rolle, als mir bislang bewusst war. !crypto !math -
kat (boneidol)'s status on Monday, 14-Oct-2013 03:21:15 EDT kat Not sure I quite recognise rip van cypherpunks present. Lots of poor TLS implementation. No trusted cipher suites. Rc4 broken, short keylengths... -
Joshua Judson Rosen (rozzin)'s status on Sunday, 13-Oct-2013 23:54:48 EDT Joshua Judson Rosen #Cypherpunks 2.0: http://adi.is/s/cpunk20/ -
Joshua Judson Rosen joined the group Cryptography.
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 07-Oct-2013 02:40:37 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Looks like we'll have a GnuPG/PGP keysigning party at the @KWLUG meeting tomorrow: http://kwlug.org/pipermail/kwlug-disc_kwlug.org/2013-October/011000.html !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 02-Oct-2013 16:36:28 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca If NSA can crack 1024 bit RSA/DH encryption in Tor, are GnuPG 1024 bit keys also vulnerable? !crypto !infosec http://techcrunch.com/2013/09/07/the-nsa-can-read-some-encrypted-tor-traffic/ -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 27-Sep-2013 04:05:35 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @erkanyilmaz probably means "Perfect Forward Secrecy", where compromising a key doesn't reveal past correspondence https://en.wikipedia.org/wiki/Perfect_forward_secrecy !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 27-Sep-2013 03:50:51 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I'll help you test GnuPG: http://sobac.com/bjonkman/pgpkey.htm !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 08-Sep-2013 04:53:00 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I think we've seen this link, but I want to pop the conversation into the !crypto group ♻ @eniac@sn.ilikefreedom.ro: [#Cryptography] Opening Discussion: Speculation on #BULLRUN http://ur1.ca/ff2av !vivalafederation !statusnet !ufos !infosec -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 08-Sep-2013 04:51:12 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I think we've seen this link, but I want to pop the conversation into the !crypto group ♻ @eniac@sn.ilikefreedom.ro -
Joshua Judson Rosen (rozzin)'s status on Friday, 06-Sep-2013 10:08:47 EDT Joshua Judson Rosen @bobjonkman, there are ways of ensuring that there is no MITM with self-signed #crypto certs. You just need a trustworthy way of doing the initial cert-exchange, like in-person or via a trusted courier (which is what the certificate-authorities are supposed to be). -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 06-Sep-2013 02:21:37 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca corr'n: How will #OpenPGPjs be any better or more secure than #Cryptocat? Javascript encryption has been criticized as impossible to do securely !crypto