StatusNettag:status.hackerposse.com,2024-03-29:TagTimeline:cryptoNotices tagged with cryptoUpdates tagged with crypto on Hacker Poesy!http://www.hackerposse.com/~rozzin/graphics/stills/ray-traced/ripple.png2024-03-28T20:45:45-04:00http://activitystrea.ms/schema/1.0/notetag:indy.im,2019-07-25:noticeId=20751530:objectType=noteNew note by boneidolI just read <br /> <br /> S.S. Al-Riyami and K.G. Paterson, Certificateless public key cryptography 2003<br /> <br /> <a href="https://web.archive.org/web/20181222114112/http://eprint.iacr.org/2003/126.pdf" title="https://web.archive.org/web/20181222114112/http://eprint.iacr.org/2003/126.pdf" rel="nofollow external noreferrer" class="attachment">https://web.archive.org/web/20181222114112/http://eprint.iacr.org/2003/126.pdf</a> <br /> <br /> The math is not too complicated, but I find the notation a pain. <br /> <br /> Also, all the fuss over the group operation being additive in G_1 and multiplicative in G_2 seems such a faff. <br /> <br /> #<span class="tag"><a href="https://indy.im/tag/math" rel="tag">math</a></span> #<span class="tag"><a href="https://indy.im/tag/crypto" rel="tag">crypto</a></span>http://activitystrea.ms/schema/1.0/post2019-07-25T21:20:56+00:002019-07-25T21:20:56+00:00http://activitystrea.ms/schema/1.0/personhttps://indy.im/user/5boneidolIndebted to tech, or is that in technical debt. Just trying to keep it real! #sex #drugs #math32.98333 49.13333boneidolkatIndebted to tech, or is that in technical debt. Just trying to keep it real! #sex #drugs #mathhomepagehttps://not.burntout.org/people/alandtruehttps://indy.im/conversation/20428736http://activitystrea.ms/schema/1.0/commenttag:status.hackerposse.com,2019-07-01:noticeId=133913:objectType=commentNew comment by rozzinALSO, I'm reminded that there was this other #<span class="tag"><a href="https://status.hackerposse.com/tag/hkp" rel="tag">HKP</a></span> #<span class="tag"><a href="https://status.hackerposse.com/tag/keyserver" rel="tag">keyserver</a></span> released a few years ago, compatible w/ #<span class="tag"><a href="https://status.hackerposse.com/tag/sks" rel="tag">SKS</a></span> but written in #<span class="tag"><a href="https://status.hackerposse.com/tag/golang" rel="tag">Golang</a></span>, which might relieve some of "zomg unmaintainable!" problems with the SKS servers: <a href="https://hockeypuck.github.io/" title="https://hockeypuck.github.io/" class="attachment" id="attachment-18786" rel="nofollow external">https://hockeypuck.github.io/</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> #<span class="tag"><a href="https://status.hackerposse.com/tag/pgp" rel="tag">PGP</a></span> #<span class="tag"><a href="https://status.hackerposse.com/tag/gnupg" rel="tag">GnuPG</a></span>http://activitystrea.ms/schema/1.0/post2019-07-01T19:50:40+00:002019-07-01T19:50:40+00:00http://activitystrea.ms/schema/1.0/personhttp://status.hackerposse.com/user/1rozzinRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.42.76537 -71.46757rozzinJoshua Judson RosenRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.Nashua, New Hampshire, USAhomepagehttp://www.hackerposse.com/~rozzintruehttps://indy.im/conversation/20416724http://activitystrea.ms/schema/1.0/commenttag:status.hackerposse.com,2019-07-01:noticeId=133912:objectType=commentNew comment by rozzinAlso it seems kind of inappropriate to be using "poisoning" as its being used here: <a href="https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" title="https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f" class="attachment" id="attachment-18785" rel="nofollow external">https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a>http://activitystrea.ms/schema/1.0/post2019-07-01T19:42:36+00:002019-07-01T19:42:36+00:00http://activitystrea.ms/schema/1.0/personhttp://status.hackerposse.com/user/1rozzinRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.42.76537 -71.46757rozzinJoshua Judson RosenRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.Nashua, New Hampshire, USAhomepagehttp://www.hackerposse.com/~rozzintruehttps://indy.im/conversation/20416724http://activitystrea.ms/schema/1.0/commenttag:status.hackerposse.com,2019-07-01:noticeId=133911:objectType=commentNew comment by rozzin@<a href="https://indy.im/boneidol" class="h-card mention" title="kat">boneidol</a> The signature-flooding attack on the SKS #<span class="tag"><a href="https://status.hackerposse.com/tag/keyservers" rel="tag">keyservers</a></span> (and DoS of their users) is bad but doesn't actually sound like any kind of #<span class="tag"><a href="https://status.hackerposse.com/tag/apocalypse" rel="tag">apocalypse</a></span>, and has basically nothing to do with the #<span class="tag"><a href="https://status.hackerposse.com/tag/wot" rel="tag">WoT</a></span>; signature-chains maybe, but that's something else entirely. !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a>http://activitystrea.ms/schema/1.0/post2019-07-01T19:40:24+00:002019-07-01T19:40:24+00:00http://activitystrea.ms/schema/1.0/personhttp://status.hackerposse.com/user/1rozzinRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.42.76537 -71.46757rozzinJoshua Judson RosenRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.Nashua, New Hampshire, USAhomepagehttp://www.hackerposse.com/~rozzintruehttps://indy.im/conversation/20416724http://activitystrea.ms/schema/1.0/notetag:status.hackerposse.com,2018-09-28:noticeId=131518:objectType=noteNew note by rozzinWith the sudden realization that #<span class="tag"><a href="http://status.hackerposse.com/tag/enigmail" rel="tag">Enigmail</a></span> has been able to decrypt #<span class="tag"><a href="http://status.hackerposse.com/tag/email" rel="tag">email</a></span> permanently upon reception for the last 3 years, I'm excited about using #<span class="tag"><a href="http://status.hackerposse.com/tag/pgp" rel="tag">PGP</a></span> #<span class="tag"><a href="http://status.hackerposse.com/tag/crypto" rel="tag">crypto</a></span> w/ #<span class="tag"><a href="http://status.hackerposse.com/tag/enigmail" rel="tag">Enigmail</a></span> again! But, oh, just in time for me #<span class="tag"><a href="http://status.hackerposse.com/tag/mozilla" rel="tag">Mozilla</a></span> broke Enigmail in #<span class="tag"><a href="http://status.hackerposse.com/tag/debian" rel="tag">Debian</a></span>: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909000" title="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909000" class="attachment" id="attachment-17805" rel="nofollow external">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909000</a> #<span class="tag"><a href="http://status.hackerposse.com/tag/ugh" rel="tag">ugh</a></span>http://activitystrea.ms/schema/1.0/post2018-09-28T20:37:05+00:002018-09-28T20:37:05+00:00http://activitystrea.ms/schema/1.0/personhttp://status.hackerposse.com/user/1rozzinRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.42.76537 -71.46757rozzinJoshua Judson RosenRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.Nashua, New Hampshire, USAhomepagehttp://www.hackerposse.com/~rozzintruetag:status.hackerposse.com,2018-09-28:noticeId=131518:objectType=thread:crc32=3894282bhttp://activitystrea.ms/schema/1.0/commenttag:status.hackerposse.com,2018-09-28:noticeId=131517:objectType=commentNew comment by rozzinHoly crap! "Since version 1.8, Enigmail can decrypt mails permanently." <a href="https://enigmail.net/index.php/en/faq-en?view=topic&id=15" title="https://enigmail.net/index.php/en/faq-en?view=topic&id=15" class="attachment" id="attachment-17804" rel="nofollow external">https://enigmail.net/index.php/en/faq-en?view=topic&id=15</a> #<span class="tag"><a href="http://status.hackerposse.com/tag/enigmail" rel="tag">enigmail</a></span> #<span class="tag"><a href="http://status.hackerposse.com/tag/pgp" rel="tag">pgp</a></span> #<span class="tag"><a href="http://status.hackerposse.com/tag/crypto" rel="tag">crypto</a></span>http://activitystrea.ms/schema/1.0/post2018-09-28T20:22:38+00:002018-09-28T20:22:38+00:00http://activitystrea.ms/schema/1.0/personhttp://status.hackerposse.com/user/1rozzinRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.42.76537 -71.46757rozzinJoshua Judson RosenRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.Nashua, New Hampshire, USAhomepagehttp://www.hackerposse.com/~rozzintruehttp://status.hackerposse.com/conversation/44450http://activitystrea.ms/schema/1.0/commenttag:status.hackerposse.com,2018-09-12:noticeId=131420:objectType=commentNew comment by rozzinI actually do really want to secure my data in transit; but it's frustrating to the point of deterrence that the tools for secure transit seem to frequently create more problems for data at rest. #<span class="tag"><a href="http://status.hackerposse.com/tag/enigmail" rel="tag">Enigmail</a></span> maintained similar barriers to PGP use for years, for example: <a href="http://status.hackerposse.com/conversation/44450#notice-52884" title="http://status.hackerposse.com/conversation/44450#notice-52884" class="attachment" id="attachment-17782" rel="nofollow external">http://status.hackerposse.com/conversation/44450#notice-52884</a> #<span class="tag"><a href="http://status.hackerposse.com/tag/crypto" rel="tag">crypto</a></span>http://activitystrea.ms/schema/1.0/post2018-09-12T14:21:27+00:002018-09-12T14:21:27+00:00http://activitystrea.ms/schema/1.0/personhttp://status.hackerposse.com/user/1rozzinRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.42.76537 -71.46757rozzinJoshua Judson RosenRobotanist, FOSS engineer, artist w/ a superhuman ability to distinguish shades of khaki. FoxtrotGPS, libvisualid, GNU Robots maintainer.Nashua, New Hampshire, USAhomepagehttp://www.hackerposse.com/~rozzintruetag:status.hackerposse.com,2018-08-24:noticeId=131327:objectType=thread:crc32=ec2c2ab8http://activitystrea.ms/schema/1.0/notehttp://sn.jonkman.ca/notice/1622596New note by kwcrypto♻ @rtsn@gnusocial.de: A PGP keypair consists of multiple keys, the certificate, encrypting keys, signing keys etc. I personally have setup where I have an offline masterkey (for signing keys and creating new subkeys) and then I have signing subkeys on my everyday devices. Should my everyday computer be compromised in any way, I can just go home and revoke the subkey, create a ne<a href="http://status.hackerposse.com/attachment/16482" class="attachment more" title="Show more">…</a>http://activitystrea.ms/schema/1.0/post2017-11-18T21:38:31+00:002017-11-18T21:38:31+00:00http://activitystrea.ms/schema/1.0/personhttp://sn.jonkman.ca/user/5329kwcryptoFor anyone who wants to ask questions, get answers, and participate in the discussion about interesting cryptography. Logo CC-BY-SA gvgoebelkwcryptoKitchener-Waterloo Cryptography Interest GroupFor anyone who wants to ask questions, get answers, and participate in the discussion about interesting cryptography. Logo CC-BY-SA gvgoebelKitchener-Waterloo, Ontario, Canadahomepagehttp://sobac.com/kwcryptotruehttp://sn.jonkman.ca/conversation/1099839http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-10-30:noticeId=19712526:objectType=noteNew note by qbiTLS fingerprints: <br /> <a href="https://tlsfingerprint.io/top/" title="https://tlsfingerprint.io/top/" class="attachment" rel="nofollow external">https://tlsfingerprint.io/top/</a> <br /> !<a href="http://sn.jonkman.ca/group/416/id" class="h-card group" title="Computer and Network Security (security)">security</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> http://activitystrea.ms/schema/1.0/post2017-10-30T21:49:46+00:002017-10-30T21:49:46+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/115046qbiqbiqbiJenahomepagehttp://kubieziel.de/truehttp://sn.jonkman.ca/conversation/1088719http://activitystrea.ms/schema/1.0/notehttp://sn.jonkman.ca/notice/1593827New note by bobjonkmanformerHow To Create an Encrypted Drive in a File Container <a href="http://bob.jonkman.ca/blogs/2017/10/09/how-to-create-an-encrypted-drive-in-a-file-container/" title="http://bob.jonkman.ca/blogs/2017/10/09/how-to-create-an-encrypted-drive-in-a-file-container/" rel="nofollow external">http://bob.jonkman.ca/blogs/2017/10/09/how-to-create-an-encrypted-drive-in-a-file-container/</a> !<span class="vcard"><a href="http://sn.jonkman.ca/group/348/id" class="url" title="Cryptography (crypto)"><span class="fn nickname group">crypto</span></a></span>http://activitystrea.ms/schema/1.0/post2017-10-09T05:23:32+00:002017-10-09T05:23:32+00:00http://activitystrea.ms/schema/1.0/personhttp://sn.jonkman.ca/user/2bobjonkmanformerDon't use this account! Subscribe to me at https://gs.jonkman.ca/bobjonkman/43.60009 -80.5497bobjonkmanformerFormer Bob Jonkman -- Please use the new server at https://gs.jonkman.caDon't use this account! Subscribe to me at https://gs.jonkman.ca/bobjonkman/Elmira, Ontario, Canadahomepagehttps://gs.jonkman.ca/bobjonkmantruehttp://sn.jonkman.ca/conversation/107716543.6000900 -80.5497000http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-10-04:noticeId=18936357:objectType=noteNew note by qbiWie man #<span class="tag"><a href="https://quitter.se/tag/scrypt" rel="tag">scrypt</a></span> richtig anwendet, hat @FiloSottile getestet: <br /> <a href="https://blog.filippo.io/the-scrypt-parameters/" title="https://blog.filippo.io/the-scrypt-parameters/" class="attachment" rel="nofollow external">https://blog.filippo.io/the-scrypt-parameters/</a> <br /> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> !<a href="https://gnusocial.de/group/269/id" class="h-card group" title="verschluesselung (verschluesselung)">verschluesselung</a> http://activitystrea.ms/schema/1.0/post2017-10-04T20:29:28+00:002017-10-04T20:29:28+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/115046qbiqbiqbiJenahomepagehttp://kubieziel.de/truehttp://sn.jonkman.ca/conversation/1074955http://activitystrea.ms/schema/1.0/notetag:social.daemons.it,2017-09-22:noticeId=225528:objectType=noteNew note by drymerISO Rejects NSA Encryption Algorithms - Schneier on Security - <a href="https://www.schneier.com/blog/archives/2017/09/iso_rejects_nsa.html" title="https://www.schneier.com/blog/archives/2017/09/iso_rejects_nsa.html" rel="nofollow external noreferrer" class="attachment">https://www.schneier.com/blog/archives/2017/09/iso_rejects_nsa.html</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card u-url p-nickname group" title="Cryptography (crypto)">crypto</a> !<a href="http://quitter.se/group/938/id" class="h-card u-url p-nickname group" title="Privacy (privacy)">privacy</a>http://activitystrea.ms/schema/1.0/post2017-09-22T06:23:27+00:002017-09-22T06:23:27+00:00http://activitystrea.ms/schema/1.0/personhttps://social.daemons.it/user/1drymerMe gusta el software libre, el conocimiento libre y esas cosas.drymerdrymerMe gusta el software libre, el conocimiento libre y esas cosas./dev/nullhomepagehttps://daemons.ittruehttp://sn.jonkman.ca/conversation/1068025http://activitystrea.ms/schema/1.0/notehttp://sn.jonkman.ca/notice/1581612New note by kwcryptoAlmost a good thing: "NSA has now agreed to drop all but [the techniques] *least* likely to be vulnerable to hacks" <a href="http://www.reuters.com/article/us-cyber-standards-insight/distrustful-u-s-allies-force-spy-agency-to-back-down-in-encryption-fight-idUSKCN1BW0GV" title="http://www.reuters.com/article/us-cyber-standards-insight/distrustful-u-s-allies-force-spy-agency-to-back-down-in-encryption-fight-idUSKCN1BW0GV" rel="nofollow external">http://www.reuters.com/article/us-cyber-standards-insight/distrustful-u-s-allies-force-spy-agency-to-back-down-in-encryption-fight-idUSKCN1BW0GV</a> !<span class="vcard"><a href="http://sn.jonkman.ca/group/348/id" class="url" title="Cryptography (crypto)"><span class="fn nickname group">Crypto</span></a></span> via @HNTooter@mastodon.socialhttp://activitystrea.ms/schema/1.0/post2017-09-21T14:32:51+00:002017-09-21T14:32:51+00:00http://activitystrea.ms/schema/1.0/personhttp://sn.jonkman.ca/user/5329kwcryptoFor anyone who wants to ask questions, get answers, and participate in the discussion about interesting cryptography. Logo CC-BY-SA gvgoebelkwcryptoKitchener-Waterloo Cryptography Interest GroupFor anyone who wants to ask questions, get answers, and participate in the discussion about interesting cryptography. Logo CC-BY-SA gvgoebelKitchener-Waterloo, Ontario, Canadahomepagehttp://sobac.com/kwcryptotruehttp://sn.jonkman.ca/conversation/1067634http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-09-20:noticeId=18423417:objectType=noteNew note by netmackanJust published our master's thesis student's paper on Post-Quantum Cryptography for digital signatures in PKI !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> <a href="http://blog.ejbca.org/2017/09/masters-thesis-paper-on-post-quantum.html" title="http://blog.ejbca.org/2017/09/masters-thesis-paper-on-post-quantum.html" class="attachment" rel="nofollow external">http://qttr.at/1y73</a>http://activitystrea.ms/schema/1.0/post2017-09-20T08:54:32+00:002017-09-20T08:54:32+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/117163netmackannetmackanMarkus KilåsStockholmhomepagehttps://www.kilås.setruehttp://sn.jonkman.ca/conversation/1066797http://activitystrea.ms/schema/1.0/notetag:bobinas.p4g.club,2017-09-10:noticeId=401059:objectType=noteNew note by ziggysPorque en p4g decimos malas palabras y otras guarangadas, hemos tenido que crear una sala #<span class="tag"><a href="https://bobinas.p4g.club/tag/xmpp" rel="tag">xmpp</a></span> con cifrado #<span class="tag"><a href="https://bobinas.p4g.club/tag/openpgp" rel="tag">openpgp</a></span> ¡Ahora estamos más tranquilos! Creo. !<a href="https://quitter.cat/group/406/id" class="h-card group" title="XMPP en Castellano (xmppes)">xmppes</a> !<a href="https://quitter.es/group/126/id" class="h-card group" title="Privacidad en la era digital (privacidad)">privacidad</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> !<a href="https://bobinas.p4g.club/group/7/id" class="h-card group" title="p4g pandilla4gatos (p4g)">p4g</a> http://activitystrea.ms/schema/1.0/post2017-09-10T15:42:25+00:002017-09-10T15:42:25+00:00http://activitystrea.ms/schema/1.0/personhttps://bobinas.p4g.club/user/2ziggysJupiteriano en el exilio. Irónico por naturaleza. ziggys@p4g.club ziggys@autistici.org Huella de mi llave gpg: AABF1114ziggysziggysJupiteriano en el exilio. Irónico por naturaleza. ziggys@p4g.club ziggys@autistici.org Huella de mi llave gpg: AABF1114homepagehttps://gnulinuxfiliaincurable.gitlab.iotruehttp://sn.jonkman.ca/conversation/1060482http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-08-16:noticeId=17270875:objectType=noteNew note by qbi#<span class="tag"><a href="https://quitter.se/tag/openssl" rel="tag">OpenSSL</a></span> nutzt ab einen neuen Zufallszahlengenerator: <br /> <a href="https://www.openssl.org/blog/blog/2017/08/12/random/" title="https://www.openssl.org/blog/blog/2017/08/12/random/" class="attachment" rel="nofollow external">https://www.openssl.org/blog/blog/2017/08/12/random/</a> <br /> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> !<a href="https://gnusocial.de/group/269/id" class="h-card group" title="verschluesselung (verschluesselung)">verschluesselung</a> http://activitystrea.ms/schema/1.0/post2017-08-16T07:19:09+00:002017-08-16T07:19:09+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/115046qbiqbiqbiJenahomepagehttp://kubieziel.de/truehttp://sn.jonkman.ca/conversation/1044308http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-08-11:noticeId=17141156:objectType=noteNew note by qbiIs your encrypted USB drive secure? – Forscher greifen vermeintlich sichere sticks an <a href="https://www.kaspersky.com/blog/encrypted-usb-drives-audit/17948/" title="https://www.kaspersky.com/blog/encrypted-usb-drives-audit/17948/" rel="nofollow external">https://quitter.se/url/4282847</a><br /> !<a href="http://sn.jonkman.ca/group/416/id" class="h-card group" title="Computer and Network Security (security)">security</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a>http://activitystrea.ms/schema/1.0/post2017-08-11T06:41:55+00:002017-08-11T06:41:55+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/115046qbiqbiqbiJenahomepagehttp://kubieziel.de/truehttp://sn.jonkman.ca/conversation/1041061http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-08-05:noticeId=16974100:objectType=noteNew note by qbiLoup Vaillant hat es getan. Selbst !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> code geschrieben. Seine Erfahrungen <br /> <a href="http://loup-vaillant.fr/articles/implemented-my-own-crypto" title="http://loup-vaillant.fr/articles/implemented-my-own-crypto" class="attachment" rel="nofollow external">http://loup-vaillant.fr/articles/implemented-my-own-crypto</a>http://activitystrea.ms/schema/1.0/post2017-08-05T17:53:49+00:002017-08-05T17:53:49+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/115046qbiqbiqbiJenahomepagehttp://kubieziel.de/truehttp://sn.jonkman.ca/conversation/1037324http://activitystrea.ms/schema/1.0/notetag:bobinas.p4g.club,2017-08-03:noticeId=346016:objectType=noteNew note by ziggysCon los muchachos de la pandilla cuatro gatos nos hemos puesto a probar esta excelente aplicación de mensajería cifrada descentralizada con cifrado e2e <a href="https://smokeappope.sourceforge.io/" title="https://smokeappope.sourceforge.io/" class="attachment" rel="nofollow">https://smokeappope.sourceforge.io/</a> Es una joyita !<a href="https://quitter.es/group/126/id" class="h-card group" title="Privacidad en la era digital (privacidad)">privacidad</a> !<a href="https://bobinas.p4g.club/group/1/id" class="h-card group" title="bobinas p4g (bobinas)">bobinas</a> !<a href="https://bobinas.p4g.club/group/7/id" class="h-card group" title="p4g pandilla4gatos (p4g)">p4g</a> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a> http://activitystrea.ms/schema/1.0/post2017-08-03T23:26:15+00:002017-08-03T23:26:15+00:00http://activitystrea.ms/schema/1.0/personhttps://bobinas.p4g.club/user/2ziggysJupiteriano en el exilio. Irónico por naturaleza. ziggys@p4g.club ziggys@autistici.org Huella de mi llave gpg: AABF1114ziggysziggysJupiteriano en el exilio. Irónico por naturaleza. ziggys@p4g.club ziggys@autistici.org Huella de mi llave gpg: AABF1114homepagehttps://gnulinuxfiliaincurable.gitlab.iotruehttp://sn.jonkman.ca/conversation/1036071http://activitystrea.ms/schema/1.0/notetag:mblog.kavehmoravej.com,2017-08-03:noticeId=7530:objectType=noteNew note by kavehA brief history of GnuPG: vital to online security but free and underfunded:<br /><br /><a href="http://theconversation.com/a-brief-history-of-gnupg-vital-to-online-security-but-free-and-underfunded-80800" title="http://theconversation.com/a-brief-history-of-gnupg-vital-to-online-security-but-free-and-underfunded-80800" class="attachment" rel="nofollow">http://theconversation.com/a-brief-history-of-gnupg-vital-to-online-security-but-free-and-underfunded-80800</a><br /><br /> !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a>http://activitystrea.ms/schema/1.0/post2017-08-03T20:01:04+00:002017-08-03T20:01:04+00:00http://activitystrea.ms/schema/1.0/personhttps://mblog.kavehmoravej.com/user/1kaveh#1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility.kavehkaveh#1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility.earthhomepagehttps://kavehmoravej.comtruehttp://sn.jonkman.ca/conversation/1035878http://activitystrea.ms/schema/1.0/notetag:quitter.se,2017-07-28:noticeId=16614579:objectType=noteNew note by qbiIch erkläre dem Kind Verschlüsselung und es erfindet mal eben Replay-Angriffe. !<a href="http://sn.jonkman.ca/group/348/id" class="h-card group" title="Cryptography (crypto)">crypto</a>http://activitystrea.ms/schema/1.0/post2017-07-28T18:58:50+00:002017-07-28T18:58:50+00:00http://activitystrea.ms/schema/1.0/personhttp://quitter.se/user/115046qbiqbiqbiJenahomepagehttp://kubieziel.de/truehttp://sn.jonkman.ca/conversation/1031853