|
You are here |
keyoxide.org | ||
| | | | |
urda.com
|
|
| | | | | Use this to send me secure communications or verify my signed messages. | |
| | | | |
dusted.codes
|
|
| | | | | SHA-256 is not a secure password hashing algorithm | |
| | | | |
blog.oddbit.com
|
|
| | | | | In today's post, we look at KeyOxide, a service that allows you to cryptographically assert ownership of online resources using your GPG key. Some aspects of the service are less than obvious; in response to some questions I saw on Mastodon I though I would put together a short guide to making use of the service. We're going to look at the following high-level tasks: Create a GPG key Publish the GPG key | |
| | | | |
dheinemann.com
|
|
| | | Kagi is a new premium search engine, available for $10 USD/month. Is it worth the money? Here are my first impressions. | ||