Cryptography (crypto) group, page 2
-
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Friday, 12-May-2017 02:03:05 UTC Kitchener-Waterloo Cryptography Interest Group ♻ @margjohnst UW names street after Bletchley Park code-breaker http://therecord.com/news-story/7308387-uw-names-street-after-bletchley-park-code-breaker !crypto -
netmackan (netmackan@quitter.se)'s status on Saturday, 29-Apr-2017 13:10:02 UTC netmackan More improvements in the implementation of Shor's algorithm bring death of RSA closer !crypto http://qttr.at/1t38 -
omeelog (omeelog@gnusocial.de)'s status on Wednesday, 19-Apr-2017 09:28:51 UTC omeelog ♻ @kirschner: Overview of secure mobile messengers by @fsfe 's @__h2__
http://blogs.fsfe.org/h2/secure-mobile-messengers/
!crypto !verschluesselung !threema -
netmackan (netmackan@quitter.se)'s status on Saturday, 15-Apr-2017 06:40:18 UTC netmackan Post-quantum cryptography, new introductory paper aimed at general science audience: !crypto http://qttr.at/1s9d -
Matthias Kneis (realramnit@quitter.se)'s status on Monday, 27-Mar-2017 11:57:27 UTC Matthias Kneis Ein #ITsec-Team hat sich den Key-Exchange beim !Crypto Protokoll von #Signal angesehn. Fazit: läuft! http://qttr.at/1r1z #digitalAikido -
Jens Kubieziel (qbi@quitter.se)'s status on Monday, 20-Mar-2017 22:21:29 UTC Jens Kubieziel Ein Aufruf von https://owasp.org ist auch eher irritierend. ;)
@owasp @owasp_de !crypto
https://quitter.se/attachment/3372411 -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Monday, 13-Mar-2017 18:29:23 UTC Kitchener-Waterloo Cryptography Interest Group ♻ @bobjonkman I'm at the @UWCrysp lecture with Josh Benaloh https://crysp.uwaterloo.ca/speakers/20170314-Benaloh !ElectoralReform !Privacy !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Monday, 13-Mar-2017 18:26:43 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I'm at the @UWCrysp lecture with Josh Benaloh https://crysp.uwaterloo.ca/speakers/20170314-Benaloh !ElectoralReform !Privacy !crypto -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Sunday, 12-Mar-2017 17:54:59 UTC Kitchener-Waterloo Cryptography Interest Group ♻ @ThatAndromeda We had cryptographic potatoes for dinner. They were salted and hashed. ¶ via #Twitter !crypto -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto@sn.jonkman.ca)'s status on Tuesday, 28-Feb-2017 19:36:09 UTC Kitchener-Waterloo Cryptography Interest Group "Elections with both Privacy and Integrity" lecture by Josh Benaloh at @UWCrysp Monday, 13 March 2017 https://crysp.uwaterloo.ca/speakers/20170314-Benaloh !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Thursday, 23-Feb-2017 15:29:02 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @dangoodin001 At death’s door for years, widely used SHA1 function is now dead https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ ¶ via #Twitter !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Tuesday, 14-Feb-2017 22:38:09 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I knew that, and I've used OTR on Pidgin. My post was mostly an excuse to get the thread into the !crypto and !XMPP groups. -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Tuesday, 14-Feb-2017 21:09:15 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Finally, !crypto for !XMPP with #Pidgin https://github.com/gkdr/lurch -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Sunday, 12-Feb-2017 22:12:14 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca LOL: bob@social.freedombone.net writes: The goal should be end-to-end encryption which is actually trustable, rather than a fashion accessory. !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Monday, 06-Feb-2017 16:53:26 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @kat@quitter.se Are you seeing mechanical failures in those encrypted drives, or media failures (soft errors that irrevocably corrupt the encryption)? !crypto -
அருண் ஐசக் (Arun Isaac) (arunisaac@social.systemreboot.net)'s status on Tuesday, 24-Jan-2017 05:50:32 UTC அருண் ஐசக் (Arun Isaac) http://secushare.org/PGP 15 reasons not to start using PGP !privacy !crypto !selfhosting -
ziggys (ziggys@bobinas.p4g.club)'s status on Friday, 20-Jan-2017 19:46:11 UTC ziggys https://bobinas.p4g.club/url/49638 #snowden #email #lavabit !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer@sn.jonkman.ca)'s status on Monday, 16-Jan-2017 08:06:13 UTC Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Agreed, the #WhatsApp "issue" is not a bug, it's there by design. But a designer vulnerability is still a vulnerability. https://www.eff.org/deeplinks/2017/01/google-launches-key-transparency-while-tradeoff-whatsapp-called-backdoor !crypto