Explore >> Select a destination


You are here

ankane.org
| | dgroshev.com
5.3 parsecs away

Travel
| | [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses.
| | artsy.github.io
4.1 parsecs away

Travel
| | Encrypting ActiveRecord Fields Without Downtime. May 30,...
| | labs.withsecure.com
4.3 parsecs away

Travel
| | Full disk encryption is one of the cornerstones of modern endpoint protection. It is not only an effective method to protect sensitive data against physical theft, but it also protects data integrity against tampering attacks.
| | blog.hboeck.de
25.3 parsecs away

Travel
| [AI summary] The blog post discusses a security vulnerability in Owncloud's encryption module, highlighting its weaknesses in cryptographic design and the risks of implementing custom encryption protocols without proper expertise.