|
|
| 1. | | Toxic Tokens: Using UUIDs for Authorization Is Dangerous (nccgroup.com) | | 4 points by tprynn on May 10, 2021 | past | |
| 2. | | Code Patterns for API Authorization: Designing for Security (nccgroup.com) | | 2 points by tprynn on April 21, 2020 | past | |
| 3. | | A Hacker Guide to Deep-Learning Based AES Side Channel Attacks (elie.net) | | 4 points by tprynn on Aug 10, 2019 | past | |
| 4. | | Deconstructing the Phishing Campaigns That Target Gmail Users (elie.net) | | 1 point by tprynn on Aug 8, 2019 | past | |
| 5. | | Boeing 757 Testing Shows Airplanes Vulnerable to Hacking, DHS Says (aviationtoday.com) | | 2 points by tprynn on Nov 9, 2017 | past | |
| 6. | | Testing Random, Valid SQL in CockroachDB (cockroachlabs.com) | | 34 points by tprynn on Oct 19, 2016 | past | 2 comments | |
| 7. | | Reviewing bug bounties – a hacker's perspective (skeletonscribe.net) | | 2 points by tprynn on Aug 12, 2016 | past | |
| 8. | | Reflections: The ecosystem is moving (whispersystems.org) | | 226 points by tprynn on May 10, 2016 | past | 99 comments | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|