Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Practical Collision Attack Against Long Key IDs in PGP
(
soatok.blog
)
10 points
by
zdw
18 hours ago
|
past
|
discuss
Everything You Need to Know About Email Encryption in 2026
(
soatok.blog
)
33 points
by
birdculture
23 hours ago
|
past
|
9 comments
Everything You Need to Know About Email Encryption in 2026
(
soatok.blog
)
10 points
by
thm
2 days ago
|
past
|
discuss
Everything You Need to Know About Email Encryption in 2026
(
soatok.blog
)
7 points
by
tempodox
3 days ago
|
past
|
discuss
Everything You Need to Know About Email Encryption in 2026
(
soatok.blog
)
48 points
by
some_furry
3 days ago
|
past
|
9 comments
GNU: A Heuristic for Bad Cryptography
(
soatok.blog
)
10 points
by
stackghost
11 days ago
|
past
|
4 comments
Key Transparency for the Fediverse
(
soatok.blog
)
5 points
by
walterbell
17 days ago
|
past
The Revolution Will Not Make the Hacker News Front Page
(
soatok.blog
)
25 points
by
blackhole
21 days ago
|
past
|
4 comments
Key Transparency for the Fediverse
(
soatok.blog
)
20 points
by
todsacerdoti
23 days ago
|
past
|
2 comments
Moving Beyond the NPM Elliptic Package
(
soatok.blog
)
8 points
by
woodruffw
49 days ago
|
past
|
1 comment
Moving Beyond the NPM Elliptic Package
(
soatok.blog
)
2 points
by
zdw
49 days ago
|
past
The Dreamseeker's Vision of Tomorrow
(
soatok.blog
)
5 points
by
SlackingOff123
84 days ago
|
past
Barking Up the Ratchet Tree – MLS Is Neither Royal nor Nude
(
soatok.blog
)
23 points
by
cityroler
4 months ago
|
past
|
2 comments
Improving Geographical Resilience for Distributed Open Source Teams with Freon
(
soatok.blog
)
31 points
by
zdw
5 months ago
|
past
Age verification doesn't need to be a privacy footgun
(
soatok.blog
)
56 points
by
zdw
5 months ago
|
past
|
91 comments
Against the censorship of adult content by payment processors
(
soatok.blog
)
255 points
by
SlackingOff123
5 months ago
|
past
|
250 comments
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps
(
soatok.blog
)
24 points
by
zdw
6 months ago
|
past
|
11 comments
Checklists Are the Thief of Joy
(
soatok.blog
)
5 points
by
zdw
6 months ago
|
past
|
3 comments
What to Use Instead of PGP (2024)
(
soatok.blog
)
3 points
by
xeonmc
6 months ago
|
past
The Tech Industry Doesn't Understand Consent
(
soatok.blog
)
13 points
by
ColinWright
6 months ago
|
past
|
6 comments
My Blog Lasted Longer Than the Confederacy (2024)
(
soatok.blog
)
7 points
by
hlieberman
8 months ago
|
past
|
1 comment
An appeal to companies doing AI
(
soatok.blog
)
80 points
by
todsacerdoti
8 months ago
|
past
|
58 comments
The Authenticity Drought
(
soatok.blog
)
7 points
by
halosghost
9 months ago
|
past
The Practical Limitations of End-to-End Encryption
(
soatok.blog
)
44 points
by
todsacerdoti
9 months ago
|
past
|
45 comments
Post-Quantum Cryptography Is About the Keys You Don't Play
(
soatok.blog
)
7 points
by
dmarto
9 months ago
|
past
Collatzeral damage: bitwise and proof foolish
(
soatok.blog
)
14 points
by
fanf2
9 months ago
|
past
|
2 comments
The insecurity of telecom stacks in the wake of Salt Typhoon
(
soatok.blog
)
312 points
by
zdw
10 months ago
|
past
|
207 comments
Reviewing the cryptography used by Signal
(
soatok.blog
)
172 points
by
todsacerdoti
10 months ago
|
past
|
151 comments
Hell is overconfident developers writing encryption code
(
soatok.blog
)
201 points
by
zdw
11 months ago
|
past
|
238 comments
Too Many People Don't Value the Time of Security Researchers
(
soatok.blog
)
22 points
by
zdw
11 months ago
|
past
|
5 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: