Shaare your links...
2434 links
interesting links Home Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
◄Older
page 1 / 10
183 results for tags security x
  • cocotb | Python verification framework
    cocotb is an open source coroutine-based cosimulation testbench environment for verifying VHDL and SystemVerilog RTL using Python.
    Found via https://www.raspberrypi.com/news/rp2350-hacking-challenge-2-into-extra-time/ and https://connectingindustry.com/the-chipwhisperer-husky-is-a-revolutionary-device-developed-by-newae-technology-inc/.
    Mon Nov 3 18:17:06 2025 - permalink -
    - https://www.cocotb.org/
    electronics hardware Python security VHDL
  • Simplelists Blog - DMARC vs. DKIM: What’s The Difference? | Simplelists
    Found via the Scheme mailing lists https://srfi-email.schemers.org/schemeorg/ mentioned on https://planet.scheme.org/
    Fri Oct 24 16:41:28 2025 - permalink -
    - https://www.simplelists.com/blog/dmarc-vs-dkim-what-is-the-difference/
    e-mail reading Scheme security TODO
  • FreeIPA - Identity, Policy, Audit
    Mentioned on the 9fans mailing list https://marc.info/?l=9fans&m=175804582801547&w=2
    See also https://en.m.wikipedia.org/wiki/FreeIPA
    Mon Sep 22 06:24:19 2025 - permalink -
    - https://www.freeipa.org/
    Linux plan9 security software
  • Export Google Authenticator secret OTP-keys · GitHub
    Explanation and JavaScript code to translate secret OTP keys from Google Authenticator to a format useful for Yubikey.
    https://alexbakker.me/post/parsing-google-auth-export-qr-code.html has some details about the format. Alex Bakker has written https://github.com/beemdevelopment/Aegis, an {T,H}OTP authenticator app for Android.
    Fri Aug 8 11:13:16 2025 - permalink -
    - https://gist.github.com/mapster/4b8b9f8f6b92cc1ca58ae5506e0508f7
    Android OTP security
  • Keepass2Android Review
    "Keepass2Android (K2A) is an open souse [sic] port of the excellent KeePass password manager for Windows to the Android platform."
    I just read on https://github.com/android-password-store/Android-Password-Store/discussions/3260 that the password store application has been archived, i.e. development has stopped.
    Fri Aug 8 08:49:02 2025 - permalink -
    - https://proprivacy.com/password-manager/review/keepass2android
    Android cryptography security
  • https://csrc.nist.gov/csrc/media/presentations/2024/crclub-2024-10-16/images-media/crypto-club-20241016--hugo--OPAQUE.pdf
    The OPAQUE Password Protocol
    Authentication, Secret Retrieval, End-to-end security
    Hugo Krawczyk, AWS
    NIST Seminar – 10.16.2024

    Found after re-reading https://datatracker.ietf.org/doc/html/draft-haase-aucpace-02 where OPAQUE was mentioned as winner of the CFRG password protocol competition.
    See https://cfrg.github.io/draft-irtf-cfrg-opaque/draft-irtf-cfrg-opaque.html
    Tue May 13 13:00:56 2025 - permalink -
    - https://csrc.nist.gov/csrc/media/presentations/2024/crclub-2024-10-16/images-media/crypto-club-20241016--hugo--OPAQUE.pdf
    cryptography security TODO
  • FSF announces JShelter browser add-on to combat threats from nonfree JavaScript — Free Software Foundation — Working together for free software
    he Free Software Foundation (FSF) today announced the JShelter project, an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection.
    The project's website is at https://jshelter.org/.
    Tue May 13 12:13:26 2025 - permalink -
    - https://www.fsf.org/news/fsf-announces-jshelter-browser-add-on-to-combat-threats-from-nonfree-javascript
    FSF JavaScript security tool
  • Ben's Book of the Month: Review of "A Vulnerable System: The History of Information Security in the Computer Age" | RSA Conference
    Found on https://www.rsaconference.com/library/Blog/bens-book-of-the-month-review-of-computer-security-and-the-internet, a review of Paul C. van Oorschot's "Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin".
    https://www.amazon.com/Vulnerable-System-Information-Security-Computer/dp/1501758942/ref=monarch_sidesheet_title
    Mon May 5 12:45:00 2025 - permalink -
    - https://www.rsaconference.com/Library/blog/bens-book-of-the-month-review-of-a-vulnerable-system
    book computer security
  • Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
    Interesting book by Paul C. van Oorschot, recommended by Rik Farrow on the TUHS mailing list https://www.tuhs.org/pipermail/tuhs/2025-May/031832.html
    Mon May 5 07:17:33 2025 - permalink -
    - https://people.scs.carleton.ca/~paulv/toolsjewels.html
    book computer cryptography security
  • GitHub repositories of A-Trust
    Tools to inspect certificates, test APIs of A-Trust, the provider of signature services such as "Handysignatur" and "ID Austria".
    Wed Feb 12 08:02:28 2025 - permalink -
    - https://github.com/A-Trust
    cryptography security software tool
  • An exposed apt signing key and how to improve apt security
    Fri Dec 13 13:00:16 2024 - permalink -
    - https://blog.cloudflare.com/dont-use-apt-key/
    Debian Linux reading security TODO
  • Playing with Oberon in 2019
    Blog, mostly about the Plan 9 operating system. Found https://seh.dev/p9sk1/ when searching for information about the dp9ik authentication protocol introduced by 9front.

    Other pages I found are
    - https://echoline.org/webterm.pdf, explaining Webterm, an HTML5 remote desktop for use with Plan 9[1] which re-
     imagines drawterm inside of a browser. The source code is available at https://github.com/echoline/webterm
    - https://man.9front.org/6/authsrv
    Thu May 23 13:50:16 2024 - permalink -
    - https://seh.dev/oberon/
    blog computer crytopgraphy history language Oberon plan9 programming security Wirth
  • The Language-theoretic approach (LangSec)
    The Language-theoretic approach (LangSec) regards the Internet insecurity epidemic as a consequence of ‘ad hoc’ programming of input handling at all layers of network stacks, and in other kinds of software stacks.  LangSec posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a ‘recognizer’ for that language.
    The recognition must be feasible, and the recognizer must match the language in required computation power.

    Found on the TUHS mailing list https://www.tuhs.org/pipermail/tuhs/2024-May/029846.html
    Mon May 20 16:26:16 2024 - permalink -
    - https://langsec.org/
    computer reading security
  • Getting the maximum of your C compiler, for security
    Found on Sandra Snan's notice https://idiomdrottning.org/notice/AgXNxNMyxT1ZMgpLPM
    Thu May 16 23:09:13 2024 - permalink -
    - https://airbus-seclab.github.io/c-compiler-security/
    C compiler security software
  • What is the Small Web? – Aral Balkan
    Ideas about reducing the dependence on big companies. See also the author's blog, which contains interesting articles such as
    https://ar.al/2021/11/23/how-to-apply-a-chroma-key-using-imagemagick/
    https://ar.al/2018/10/26/version-display-linux-version-information

    https://ar.al/2021/08/16/key-mapper-a-visual-tool-for-remapping-keys-and-more-on-linux/
    https://ar.al/2019/03/12/reclaiming-your-tilde-and-backtick-with-mac-uk-layout-on-an-ansi-us-keyboard/
    https://ar.al/2019/03/11/setting-multiple-key-bindings-for-the-same-action-in-gnome/
    https://ar.al/2018/07/18/typographical-typing-habits-for-linux
    Fri Feb 23 11:15:43 2024 - permalink -
    - https://ar.al/2020/08/07/what-is-the-small-web/#fnref:4
    blog key-binding politics security TODO web
  • Using FIDO2 Auth Keys (Yubikey, Solokeys) with MacOS and FreeBSD // hackacad.net
    Just what it says in the title.
    Tue Feb 20 13:43:01 2024 - permalink -
    - https://hackacad.net/freebsd/2020/03/27/using-fido2-auth-keys-yubikey-solokey-with-macos-and-freebsd.html
    BSD cryptography HOWTO security
  • GPSJAM - daily GPS/GNSS Interference Map
    Daily maps of navigation accuracy as reported by aircraft using ADS-B.
    Provided by John Wiseman
    Mon Feb 12 15:34:10 2024 - permalink -
    - https://gpsjam.org/
    hack satellite-navigation security
  • GPG in Emacs - First Step Towards Data Security
    Found on Sacha Chua's blog https://sachachua.com/blog/2024/01/2024-01-01-emacs-news/
    Thu Jan 4 00:02:04 2024 - permalink -
    - http://yitang.uk/2023/12/28/gpg-in-emacs-first-step-towards-data-security/
    emacs gpg security TODO
  • DROPSAFE Security, Privacy, Digital Rights, and Nerdy Parenthood
    Found via a link on the TUHS mailing list to https://alecmuffett.com/article/108789
    See https://alecmuffett.com/article/108139 "Hot on the heels of #ChatControl and in the name of “identity” and “consumer choice” the EU seeks the ability to undetectably spy on HTTPS communication; 300+ experts say “no” to #Article45 of #eIDAS #QWAC"
    Tue Jan 2 12:59:19 2024 - permalink -
    - https://alecmuffett.com
    blog cryptography security TODO
  • A demo of the WebAuthn specification
    Found in c't 2023-10 (TBC).
    See also https://passkey.org/ which was mentioned in the same article.
    Fri Nov 17 15:59:56 2023 - permalink -
    - https://webauthn.io/
    computer reading security TODO
Links per page: 20 50 100
◄Older
page 1 / 10
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.