Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Barking Up the Ratchet Tree – MLS Is Neither Royal nor Nude
(
soatok.blog
)
23 points
by
cityroler
40 days ago
|
past
|
2 comments
Improving Geographical Resilience for Distributed Open Source Teams with Freon
(
soatok.blog
)
31 points
by
zdw
56 days ago
|
past
Age verification doesn't need to be a privacy footgun
(
soatok.blog
)
56 points
by
zdw
65 days ago
|
past
|
91 comments
Against the censorship of adult content by payment processors
(
soatok.blog
)
255 points
by
SlackingOff123
72 days ago
|
past
|
250 comments
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps
(
soatok.blog
)
24 points
by
zdw
87 days ago
|
past
|
11 comments
Checklists Are the Thief of Joy
(
soatok.blog
)
5 points
by
zdw
89 days ago
|
past
|
3 comments
What to Use Instead of PGP (2024)
(
soatok.blog
)
3 points
by
xeonmc
3 months ago
|
past
The Tech Industry Doesn't Understand Consent
(
soatok.blog
)
13 points
by
ColinWright
3 months ago
|
past
|
6 comments
My Blog Lasted Longer Than the Confederacy (2024)
(
soatok.blog
)
7 points
by
hlieberman
5 months ago
|
past
|
1 comment
An appeal to companies doing AI
(
soatok.blog
)
80 points
by
todsacerdoti
5 months ago
|
past
|
58 comments
The Authenticity Drought
(
soatok.blog
)
7 points
by
halosghost
6 months ago
|
past
The Practical Limitations of End-to-End Encryption
(
soatok.blog
)
44 points
by
todsacerdoti
6 months ago
|
past
|
45 comments
Post-Quantum Cryptography Is About the Keys You Don't Play
(
soatok.blog
)
7 points
by
dmarto
6 months ago
|
past
Collatzeral damage: bitwise and proof foolish
(
soatok.blog
)
14 points
by
fanf2
6 months ago
|
past
|
2 comments
The insecurity of telecom stacks in the wake of Salt Typhoon
(
soatok.blog
)
312 points
by
zdw
6 months ago
|
past
|
207 comments
Reviewing the cryptography used by Signal
(
soatok.blog
)
172 points
by
todsacerdoti
7 months ago
|
past
|
151 comments
Hell is overconfident developers writing encryption code
(
soatok.blog
)
201 points
by
zdw
8 months ago
|
past
|
238 comments
Too Many People Don't Value the Time of Security Researchers
(
soatok.blog
)
22 points
by
zdw
8 months ago
|
past
|
5 comments
Don't use Session – Round 2
(
soatok.blog
)
36 points
by
todsacerdoti
8 months ago
|
past
|
9 comments
Don't Use Session (Signal Fork)
(
soatok.blog
)
68 points
by
xena
8 months ago
|
past
|
12 comments
Roasting Christmas Spam from Muhu AI (2024)
(
soatok.blog
)
5 points
by
some_furry
9 months ago
|
past
Roasted Christmas Spam from Muhu AI
(
soatok.blog
)
9 points
by
vegadw
9 months ago
|
past
The Better Daemons of Our Profession
(
soatok.blog
)
3 points
by
zdw
9 months ago
|
past
Imagining Private Spaces for Bluesky (Using Cryptography)
(
soatok.blog
)
4 points
by
some_furry
10 months ago
|
past
Imagining Private Airspaces for Bluesky
(
soatok.blog
)
1 point
by
cy7
10 months ago
|
past
Beyond Bcrypt
(
soatok.blog
)
6 points
by
todsacerdoti
10 months ago
|
past
Key transparency and the right to be forgotten
(
soatok.blog
)
68 points
by
zdw
10 months ago
|
past
|
48 comments
What to Use Instead of PGP
(
soatok.blog
)
6 points
by
marbu
10 months ago
|
past
|
1 comment
What to Use Instead of PGP
(
soatok.blog
)
3 points
by
thunderbong
10 months ago
|
past
What to Use Instead of PGP
(
soatok.blog
)
16 points
by
luxpir
10 months ago
|
past
|
21 comments
More
Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: