Pebbling Club 🐧🪨

  • It's Now Possible To Sign Arbitrary Data With Your SSH Keys
    Notes
    Did you know that you can use the ssh-keygen command to sign and verify signatures on arbitrary data, like files and software releases?
    Feed
    Unfurl
  • How to Sign git Commits with an SSH key - The New Stack
    Notes
    By using signing in SSH commits, you can more easily verify that each commit was submitted by a legitimate developer and not an impostor.
    Feed
    Embed
    Unfurl
  • Coin-cussion, Get ahead by using your head
    Notes
    It's well known that we use only 10% of our brains potential. Your body consumed calories to maintain that wasted 90%. What if there was a way to turn that excess into something more fiscally valuable? Coin-cussion is here to disrupt your neural network and let you cash in!
    Unfurl
  • Password Generator (Extra Strong version) | SS64.com
    Unfurl
  • Ken Shirriff's blog: Mining Bitcoin with pencil and paper: 0.67 hashes per day
    Notes
    I decided to see how practical it would be to mine Bitcoin with pencil and paper. It turns out that the SHA-256 algorithm used for mining is pretty simple and can in fact be done by hand. Not surprisingly, the process is extremely slow compared to hardware mining and is entirely impractical. But performing the algorithm manually is a good way to understand exactly how it works.
    Feed
    Unfurl
  • A Few Thoughts on Cryptographic Engineering: On the NSA
    Notes
    All of this is a long way of saying that I was totally unprepared for today's bombshell revelations describing the NSA's efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be true, but it's true on a scale I couldn't even imagine. I'm no longer the crank. I wasn't even close to cranky enough.
    Feed
    Embed
    Unfurl
  • Crypto prof asked to remove NSA-related blog post | Ars Technica
    Notes
    Today, Green's academic dean contacted him to ask that "all copies" of the blog post be removed from university servers. Green said that the move was not "my Dean's fault," but he did not elaborate. Were cryptology professors at Johns Hopkins not allowed to say, as Green had, things like:
    Unfurl
  • A Few Thoughts on Cryptographic Engineering: A note on the NSA, the future, and fixing mistakes
    Notes
    The question to me -- as an American and as someone who cares about the integrity of speech -- is how we restore faith in our technology. I don't have the answers to this question right now. Unfortunately this is a long-term problem that will consume the output of researchers and technologists much more talented than I am. I only hope to be involved in the process.
    Feed
    Embed
    Unfurl
  • Encbox.md
    Notes
    Build your own private, encrypted, open-source Dropbox-esque sync folder
    Feed
    Unfurl
  • John Resig - Keeping Passwords in Source Control
    Notes
    Finally you’ll want to create a script (I’m using a Makefile) that the user can run to encrypt and decrypt the file. This script uses OpenSSL, and specifically CAST5, to encrypt/decrypt the file
    Feed
    Embed
    Unfurl
  • google-authenticator - Two-step verification - Google Project Hosting
    Notes
    The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms, as well as a pluggable authentication module (PAM). One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth).
    Unfurl
  • GPG4Browsers - Recurity Labs
    Notes
    GPG4Browsers is a prototype implementation of the OpenPGP Message Format [RFC 4880]. The implementation is currently written as Chrome Browser Extension with a Googlemail integration for encrypting, decrypting or signing emails.
    Unfurl
  • Helene » Blog Archive » How to remove DRM from ebooks
    Notes
    "I buy books. A lot of them, and I like to own the books I purchase. By that statement I mean that I want to be able to read the book on whatever device I want. To be able to do that I have to remove the DRM from the books I buy.<br /> <br /> I NEVER distribute the books I buy, and neither should you."
    Unfurl
  • Labs/Secret - MozillaWiki
    Notes
    "The Secret library (real name TBD) is a general-purpose cryptography API and implementation for JavaScript.<br /> <br /> Our plan is to design a modern API and first expose it to chrome JS (for browser add-ons), and later expose it to content as well. "
    Unfurl
  • Benlog » Don’t Hash Secrets
    Notes
    "So the next time you’re using a hash function on anything, ask yourself: is any of the stuff I’m hashing supposed to stay secret? If so, don’t hash. Instead, use HMAC."
    Unfurl
  • Across the Stars » Blog Archive » How does Weave use Cryptography?
    Notes
    "Although the specs for the Weave server are available, it may take someone new a while to wrap their head around the whole scheme. I’m going to attempt explaining what crypto operations we do and why we do it in this blog post."
    Unfurl
  • Enigma Machine Applet
    Notes
    "This applet simulates the operation of an Enigma machine. The Germans used the Enigma machine in World War II to encrypt military messages."
    Unfurl
  • Jeffrey Friedl’s Blog » SHA-1 and HMAC-SHA1 Routines in Pure Lua
    Notes
    "I've coded up SHA-1 Secure Hash computation and HMAC-SHA1 secure signature computation in pure Lua and thought I'd share them in case anyone else would find them useful."
    Unfurl
  • The NetIP Security Resource - Diffie-Helman Article
    Notes
    "Each party raises the common number, which is 2 in this example ... to a random power and sends the result to the other. The received number is raised to the same random power. Note that both parties come up with the same secret key, which was never tran
    Unfurl
  • HMAC Digest Access Authentication for HTTP
    Notes
    "This document specifies an HTTP authentication scheme based on cryptographic hashes."
    Unfurl
  • Paj's Home: Cryptography: JavaScript MD5: sha1.js
    Notes
    "A JavaScript implementation of the Secure Hash Algorithm, SHA-1"
    Unfurl
  • sha.py
    Notes
    "A sample implementation of SHA-1 in pure Python."
    Unfurl
  • SpicyNoodles: crypto DLL for Frontier
    Notes
    "The crypto extension for Frontier implements a number of encryption algorithms and hash functions. The cryptographic code is based on the SSLeay 0.9.0b distribution (see below for copyright information)."
    Unfurl
  • sshLogin
    Notes
    "sshLogin is an application and a preferencePane designed to help users manage ssh-agent and ssh-add features in Mac OS X."
    Unfurl
  • Using encryption and digital signatures in Mail
    Notes
    I've been trying on and off for awhile to get this going again in my Mail.app, but I've lost the password to whatever account I have at Thawte and have since gotten lost in some support ticket system hell.
    Unfurl
  • JavaScrypt: Browser-Based Cryptography Tools
    Unfurl
  • Startup Says Quantum Crypto Is Real
    Unfurl