Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Barking Up the Ratchet Tree – MLS Is Neither Royal nor Nude (soatok.blog)
23 points by cityroler 40 days ago | past | 2 comments
Improving Geographical Resilience for Distributed Open Source Teams with Freon (soatok.blog)
31 points by zdw 56 days ago | past
Age verification doesn't need to be a privacy footgun (soatok.blog)
56 points by zdw 65 days ago | past | 91 comments
Against the censorship of adult content by payment processors (soatok.blog)
255 points by SlackingOff123 72 days ago | past | 250 comments
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps (soatok.blog)
24 points by zdw 87 days ago | past | 11 comments
Checklists Are the Thief of Joy (soatok.blog)
5 points by zdw 89 days ago | past | 3 comments
What to Use Instead of PGP (2024) (soatok.blog)
3 points by xeonmc 3 months ago | past
The Tech Industry Doesn't Understand Consent (soatok.blog)
13 points by ColinWright 3 months ago | past | 6 comments
My Blog Lasted Longer Than the Confederacy (2024) (soatok.blog)
7 points by hlieberman 5 months ago | past | 1 comment
An appeal to companies doing AI (soatok.blog)
80 points by todsacerdoti 5 months ago | past | 58 comments
The Authenticity Drought (soatok.blog)
7 points by halosghost 6 months ago | past
The Practical Limitations of End-to-End Encryption (soatok.blog)
44 points by todsacerdoti 6 months ago | past | 45 comments
Post-Quantum Cryptography Is About the Keys You Don't Play (soatok.blog)
7 points by dmarto 6 months ago | past
Collatzeral damage: bitwise and proof foolish (soatok.blog)
14 points by fanf2 6 months ago | past | 2 comments
The insecurity of telecom stacks in the wake of Salt Typhoon (soatok.blog)
312 points by zdw 6 months ago | past | 207 comments
Reviewing the cryptography used by Signal (soatok.blog)
172 points by todsacerdoti 7 months ago | past | 151 comments
Hell is overconfident developers writing encryption code (soatok.blog)
201 points by zdw 8 months ago | past | 238 comments
Too Many People Don't Value the Time of Security Researchers (soatok.blog)
22 points by zdw 8 months ago | past | 5 comments
Don't use Session – Round 2 (soatok.blog)
36 points by todsacerdoti 8 months ago | past | 9 comments
Don't Use Session (Signal Fork) (soatok.blog)
68 points by xena 8 months ago | past | 12 comments
Roasting Christmas Spam from Muhu AI (2024) (soatok.blog)
5 points by some_furry 9 months ago | past
Roasted Christmas Spam from Muhu AI (soatok.blog)
9 points by vegadw 9 months ago | past
The Better Daemons of Our Profession (soatok.blog)
3 points by zdw 9 months ago | past
Imagining Private Spaces for Bluesky (Using Cryptography) (soatok.blog)
4 points by some_furry 10 months ago | past
Imagining Private Airspaces for Bluesky (soatok.blog)
1 point by cy7 10 months ago | past
Beyond Bcrypt (soatok.blog)
6 points by todsacerdoti 10 months ago | past
Key transparency and the right to be forgotten (soatok.blog)
68 points by zdw 10 months ago | past | 48 comments
What to Use Instead of PGP (soatok.blog)
6 points by marbu 10 months ago | past | 1 comment
What to Use Instead of PGP (soatok.blog)
3 points by thunderbong 10 months ago | past
What to Use Instead of PGP (soatok.blog)
16 points by luxpir 10 months ago | past | 21 comments

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: