NotesBy using signing in SSH commits, you can more easily verify that each commit was submitted by a legitimate developer and not an impostor.FeedEmbedUnfurl
NotesIt's well known that we use only 10% of our brains potential. Your body consumed calories to maintain that wasted 90%. What if there was a way to turn that excess into something more fiscally valuable? Coin-cussion is here to disrupt your neural network and let you cash in! Unfurl
Notes I decided to see how practical it would be to mine Bitcoin with pencil and paper. It turns out that the SHA-256 algorithm used for mining is pretty simple and can in fact be done by hand. Not surprisingly, the process is extremely slow compared to hardware mining and is entirely impractical. But performing the algorithm manually is a good way to understand exactly how it works. FeedUnfurl
Notes All of this is a long way of saying that I was totally unprepared for today's bombshell revelations describing the NSA's efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be true, but it's true on a scale I couldn't even imagine. I'm no longer the crank. I wasn't even close to cranky enough.FeedEmbedUnfurl
NotesToday, Green's academic dean contacted him to ask that "all copies" of the blog post be removed from university servers. Green said that the move was not "my Dean's fault," but he did not elaborate. Were cryptology professors at Johns Hopkins not allowed to say, as Green had, things like:Unfurl
Notes The question to me -- as an American and as someone who cares about the integrity of speech -- is how we restore faith in our technology. I don't have the answers to this question right now. Unfortunately this is a long-term problem that will consume the output of researchers and technologists much more talented than I am. I only hope to be involved in the process.FeedEmbedUnfurl
NotesFinally you’ll want to create a script (I’m using a Makefile) that the user can run to encrypt and decrypt the file. This script uses OpenSSL, and specifically CAST5, to encrypt/decrypt the fileFeedEmbedUnfurl
NotesThe Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms, as well as a pluggable authentication module (PAM). One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth). Unfurl
NotesGPG4Browsers is a prototype implementation of the OpenPGP Message Format [RFC 4880]. The implementation is currently written as Chrome Browser Extension with a Googlemail integration for encrypting, decrypting or signing emails.Unfurl
Notes"I buy books. A lot of them, and I like to own the books I purchase. By that statement I mean that I want to be able to read the book on whatever device I want. To be able to do that I have to remove the DRM from the books I buy.<br />
<br />
I NEVER distribute the books I buy, and neither should you."Unfurl
Notes"The Secret library (real name TBD) is a general-purpose cryptography API and implementation for JavaScript.<br />
<br />
Our plan is to design a modern API and first expose it to chrome JS (for browser add-ons), and later expose it to content as well. "Unfurl
Notes"So the next time you’re using a hash function on anything, ask yourself: is any of the stuff I’m hashing supposed to stay secret? If so, don’t hash. Instead, use HMAC."Unfurl
Notes"Although the specs for the Weave server are available, it may take someone new a while to wrap their head around the whole scheme. I’m going to attempt explaining what crypto operations we do and why we do it in this blog post."Unfurl
Notes"This applet simulates the operation of an Enigma machine. The Germans used the Enigma machine in World War II to encrypt military messages."Unfurl
Notes"I've coded up SHA-1 Secure Hash computation and HMAC-SHA1 secure signature computation in pure Lua and thought I'd share them in case anyone else would find them useful."Unfurl
Notes"Each party raises the common number, which is 2 in this example ... to a random power and sends the result to the other. The received number is raised to the same random power. Note that both parties come up with the same secret key, which was never tranUnfurl
Notes"The crypto extension for Frontier implements a number of encryption algorithms and hash functions. The cryptographic code is based on the SSLeay 0.9.0b distribution (see below for copyright information)."Unfurl
NotesI've been trying on and off for awhile to get this going again in my Mail.app, but I've lost the password to whatever account I have at Thawte and have since gotten lost in some support ticket system hell.Unfurl