overflow@lemmy.ml to Privacy@lemmy.ml · 3 months agoYour TV set has become a digital billboard. And it’s only getting worse.plus-squarearstechnica.comexternal-linkmessage-square11fedilinkarrow-up1112arrow-down18
arrow-up1104arrow-down1external-linkYour TV set has become a digital billboard. And it’s only getting worse.plus-squarearstechnica.comoverflow@lemmy.ml to Privacy@lemmy.ml · 3 months agomessage-square11fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 5 months agoHacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Copsplus-squarewww.404media.coexternal-linkmessage-square2fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Copsplus-squarewww.404media.cooverflow@lemmy.ml to Privacy@lemmy.ml · 5 months agomessage-square2fedilink
overflow@lemmy.ml to politics @lemmy.world · 6 months agoLast week's legislative brawl and our new bookfrozengarlic.wordpress.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1external-linkLast week's legislative brawl and our new bookfrozengarlic.wordpress.comoverflow@lemmy.ml to politics @lemmy.world · 6 months agomessage-square1fedilink
overflow@lemmy.ml to Europe@feddit.deEnglish · 6 months agoCould we recover the radical vision of a free and united Europe? | Aeon Essaysplus-squareaeon.coexternal-linkmessage-square3fedilinkarrow-up157arrow-down11
arrow-up156arrow-down1external-linkCould we recover the radical vision of a free and united Europe? | Aeon Essaysplus-squareaeon.cooverflow@lemmy.ml to Europe@feddit.deEnglish · 6 months agomessage-square3fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agoKeeping Secretsplus-squarestanfordmag.orgexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkKeeping Secretsplus-squarestanfordmag.orgoverflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agoA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkA quick post on Chen’s algorithmplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agoWeb-based cryptography is always snake oilplus-squarewww.devever.netexternal-linkmessage-square4fedilinkarrow-up117arrow-down16
arrow-up111arrow-down1external-linkWeb-based cryptography is always snake oilplus-squarewww.devever.netoverflow@lemmy.ml to Cryptography@lemmy.ml · 7 months agomessage-square4fedilink
overflow@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agoRead the Roonplus-squareopen.substack.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down153
arrow-up1-46arrow-down1external-linkRead the Roonplus-squareopen.substack.comoverflow@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agomessage-square1fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 8 months agoSecurity Cryptography Whatever - Post-Quantum iMessage with Douglas Stebilaplus-squarepodcasts.google.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down11
arrow-up15arrow-down1external-linkSecurity Cryptography Whatever - Post-Quantum iMessage with Douglas Stebilaplus-squarepodcasts.google.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 8 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agoDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkDice Random Numbers – Simon Josefsson's blogplus-squareblog.josefsson.orgoverflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agomessage-square0fedilink
overflow@lemmy.ml to Technology@lemmy.worldEnglish · 9 months agoChinaTalk - India's Chip Warplus-squarepodcasts.google.comexternal-linkmessage-square2fedilinkarrow-up118arrow-down15
arrow-up113arrow-down1external-linkChinaTalk - India's Chip Warplus-squarepodcasts.google.comoverflow@lemmy.ml to Technology@lemmy.worldEnglish · 9 months agomessage-square2fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agoThe Fi Virtual Carrier Networkwww.gstatic.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe Fi Virtual Carrier Networkwww.gstatic.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 9 months agomessage-square1fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 9 months agoHow Android Wallpaper Images Can Threaten Your Privacyplus-squarefingerprint.comexternal-linkmessage-square0fedilinkarrow-up10arrow-down10
arrow-up10arrow-down1external-linkHow Android Wallpaper Images Can Threaten Your Privacyplus-squarefingerprint.comoverflow@lemmy.ml to Privacy@lemmy.ml · 9 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 10 months agoAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkAttack of the week: Airdrop tracingplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.ml · 10 months agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agoBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBook Review: Red Team Bluesplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 2 years agomessage-square0fedilink
minus-squareoverflow@lemmy.mltoPolitics@lemmy.ml•USA uses Solomon Islands protests against Chinalinkfedilinkarrow-up0·3 years agoWhy would anyone want any hegemon at all? No to China No to US No to any other world power linkfedilink
Why would anyone want any hegemon at all? No to China No to US No to any other world power