| 1. | | Hints and Principles for Computer System Design (2020 Version) (arxiv.org) |
| 3 points by KateLawson on Dec 10, 2020 | past | 1 comment |
|
| 2. | | A Pirate’s Life for Me, Part 3: Case Studies in Copy Protection (filfre.net) |
| 63 points by KateLawson on Jan 15, 2016 | past | 17 comments |
|
| 3. | | What's inside Google's new Go app for iOS and Android (sourcedna.com) |
| 74 points by KateLawson on July 13, 2015 | past | 21 comments |
|
| 4. | | Finding Every Vulnerable App in the App Store (sourcedna.com) |
| 8 points by KateLawson on April 20, 2015 | past | 1 comment |
|
| 5. | | Show HN: Wondering which SDKs are in iOS and Android apps & how they were made? |
| 16 points by KateLawson on Dec 20, 2013 | past | 4 comments |
|
| 6. | | Assembly Routine for Realtime Decoding of Floppy Data (linusakesson.net) |
| 103 points by KateLawson on April 6, 2013 | past | 11 comments |
|
| 7. | | Fast and branchless line drawing routines (edepot.com) |
| 4 points by KateLawson on Nov 27, 2012 | past | 1 comment |
|
| 8. | | TACK: certificate pinning to solve the SSL CA problem (tack.io) |
| 28 points by KateLawson on May 22, 2012 | past | 9 comments |
|
| 9. | | On the evolving security of password schemes (root.org) |
| 2 points by KateLawson on Jan 10, 2012 | past | 1 comment |
|
| 10. | | Daily Summary of Hacker News Daily (twitter.com/hndaily) |
| 2 points by KateLawson on May 4, 2011 | past |
|
| 11. | | Guardrails: secure Rails apps by source translation (virginia.edu) |
| 16 points by KateLawson on April 22, 2011 | past | 2 comments |
|
| 12. | | The Bad Business Decision Quote That Never Was (True Story of Bell Patent) (historyofphonephreaking.org) |
| 5 points by KateLawson on Jan 14, 2011 | past |
|
| 13. | | Even optimized memcmp leaks useful timing differences (root.org) |
| 3 points by KateLawson on Aug 5, 2010 | past |
|
| 14. | | A new direction for homebrew console hackers? (root.org) |
| 11 points by KateLawson on May 11, 2010 | past |
|
| 15. | | Analysis of the PS3 hypervisor exploit (root.org) |
| 14 points by KateLawson on Jan 27, 2010 | past | 2 comments |
|
| 16. | | I solved this encrypted BART ad. Can you? (sfbart.posterous.com) |
| 23 points by KateLawson on Jan 11, 2010 | past | 23 comments |
|
| 17. | | How HAMs got me started in computers and electronics (root.org) |
| 3 points by KateLawson on Nov 12, 2009 | past |
|
| 18. | | H(m || k) also insecure, you really should use HMAC (root.org) |
| 50 points by KateLawson on Oct 29, 2009 | past | 35 comments |
|