|
You are here |
pboyd.io | ||
| | | | |
dgroshev.com
|
|
| | | | | [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses. | |
| | | | |
dgl.cx
|
|
| | | | | ||
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | To securely store passwords they should be hashed with a slow hashing function, such as PBKDF2. PBKDF2 is slow because it calls a fast hash function many times. This blog post explores some properties that the iterations must have to be secure. | |
| | | | |
www.sysdig.com
|
|
| | | The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL. | ||