Hacker Newsnew | past | comments | ask | show | jobs | submit | tomwas54's submissionslogin
1.Towards a Sovereign Mobile Stack (modal.cx)
3 points by tomwas54 19 hours ago | past | discuss
2.AWS and Microsoft are selling more than cloud services (berthub.eu)
6 points by tomwas54 51 days ago | past
3.EU-US Data Transfers: Time to prepare for more trouble to come (noyb.eu)
16 points by tomwas54 78 days ago | past | 2 comments
4.Hello Europe, Joe Biden is gone (berthub.eu)
10 points by tomwas54 3 months ago | past | 4 comments
5.Court decides "Pay or Okay" on DerStandard.at is illegal (noyb.eu)
47 points by tomwas54 6 months ago | past | 35 comments
6.How sovereign do you want to be? (berthub.eu)
9 points by tomwas54 on May 24, 2024 | past
7.A Hard Look at Certificate Transparency, Part II: CT in Reality (educatedguesswork.org)
3 points by tomwas54 on Dec 25, 2023 | past
8.SMTP Smuggling Mitigations in Postfix (postfix.org)
5 points by tomwas54 on Dec 24, 2023 | past
9.E2EE on the Web: Isolating Plaintext (emilymstark.com)
2 points by tomwas54 on Sept 10, 2023 | past
10.Driver adventures for a 1999 webcam (benjojo.co.uk)
429 points by tomwas54 on April 28, 2023 | past | 74 comments
11.Architectural Options for Messaging Interoperability (educatedguesswork.org)
3 points by tomwas54 on March 11, 2023 | past
12.How the Netherlands Is Taming Big Tech (nytimes.com)
3 points by tomwas54 on Jan 18, 2023 | past | 1 comment
13.What's the right UX for an expired certificate? (emilymstark.com)
55 points by tomwas54 on Jan 17, 2023 | past | 101 comments
14.Diving Deeper in Vim Regular Expressions (thevaluable.dev)
2 points by tomwas54 on Nov 28, 2022 | past
15.Hours of inaction from Amazon cost cryptocurrency holders $235,000 (arstechnica.com)
1 point by tomwas54 on Sept 26, 2022 | past
16.On the Security and Privacy Properties of Public WiFi (educatedguesswork.org)
2 points by tomwas54 on Sept 24, 2022 | past
17.Systemd Support Lands in WSL (ubuntu.com)
2 points by tomwas54 on Sept 21, 2022 | past
18.Discovering Domains via a Time-Correlation Attack on Certificate Transparency (ptsecurity.com)
2 points by tomwas54 on Sept 1, 2022 | past
19.File Management Tools for Your Favorite Shell (thevaluable.dev)
2 points by tomwas54 on Aug 27, 2022 | past
20.Certificate Transparency is not a replacement for key pinning (emilymstark.com)
2 points by tomwas54 on Aug 24, 2022 | past
21.Understanding the Web Security Model, Part VI: Browser Architecture (educatedguesswork.org)
2 points by tomwas54 on June 28, 2022 | past
22.Understanding Online Identity (educatedguesswork.org)
3 points by tomwas54 on June 2, 2022 | past
23.Notes on Multiple Encryption and Content Filtering (educatedguesswork.org)
2 points by tomwas54 on May 22, 2022 | past
24.Understanding the Web Security Model, Part V: Side Channels (educatedguesswork.org)
4 points by tomwas54 on May 9, 2022 | past | 1 comment
25.Cloudflare Pages, part 2: The two privescs (assetnote.io)
1 point by tomwas54 on May 6, 2022 | past | 1 comment
26.Understanding the Web Security Model, Part IV: Cross-Origin Resource Sharing (educatedguesswork.org)
1 point by tomwas54 on April 19, 2022 | past
27.End-to-End Encryption and Messaging Interoperability (educatedguesswork.org)
19 points by tomwas54 on April 16, 2022 | past | 5 comments
28.End-to-End Encryption and Messaging Interoperability (educatedguesswork.org)
33 points by tomwas54 on April 8, 2022 | past
29.Understanding the Web Security Model: Cookies and Behavioral Advertising (educatedguesswork.org)
2 points by tomwas54 on March 13, 2022 | past
30.A lock with many keys: Spoofing DNSSEC-signed domains in 8.8.8.8 (sidnlabs.nl)
3 points by tomwas54 on March 11, 2022 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: