| | Crypto as in Crypto (2018) (benlog.com) |
|
2 points by Tomte on Aug 28, 2022 | past
|
| | Crypto as in Crypto (2018) (benlog.com) |
|
2 points by Tomte on Feb 1, 2022 | past
|
| | Crypto as in Crypto (2018) (benlog.com) |
|
2 points by Tomte on May 30, 2021 | past | 1 comment
|
| | Crypto as in Crypto (2018) (benlog.com) |
|
1 point by Tomte on Feb 20, 2020 | past
|
| | Crypto as in Crypto (2018) (benlog.com) |
|
1 point by Tomte on Aug 18, 2019 | past
|
| | Don't Hash Secrets (2008) (benlog.com) |
|
2 points by gnanesh on March 22, 2019 | past
|
| | Crypto as in Crypto (2018) (benlog.com) |
|
3 points by Tomte on March 12, 2019 | past
|
| | Crypto as in Crypto (benlog.com) |
|
1 point by Tomte on Oct 19, 2018 | past
|
| | Crypto as in Crypto (benlog.com) |
|
18 points by Tomte on April 15, 2018 | past | 23 comments
|
| | Crypto as in Crypto (benlog.com) |
|
1 point by imartin2k on Jan 16, 2018 | past
|
| | On Apple and the FBI (benlog.com) |
|
1 point by glhaynes on Feb 19, 2016 | past
|
| | The responsibility we have as software engineers (benlog.com) |
|
193 points by ingve on May 24, 2015 | past | 130 comments
|
| | Obama lets NTSB exploit widespread tire vulnerabilities (benlog.com) |
|
1 point by subleq on Jan 28, 2015 | past | 1 comment
|
| | Letter to President Obama on Surveillance and Freedom (benlog.com) |
|
4 points by jervisfm on Aug 22, 2013 | past
|
| | Security is hard, let’s improve the conversation (benlog.com) |
|
2 points by cramforce on Aug 11, 2013 | past
|
| | Don’t Hash Secrets (2008) (benlog.com) |
|
78 points by pizza on June 13, 2013 | past | 34 comments
|
| | No user is an island (benlog.com) |
|
1 point by fpgeek on June 13, 2013 | past
|
| | Firefox is the Unlocked Browser (benlog.com) |
|
2 points by metajack on March 20, 2013 | past
|
| | encryption is not gravy (benlog.com) |
|
61 points by vgnet on April 30, 2012 | past | 43 comments
|
| | A simpler, webbier approach to Web Intents (or Activities) (benlog.com) |
|
1 point by feb on April 20, 2012 | past
|
| | Encryption is (mostly) not magic (benlog.com) |
|
1 point by mbrubeck on Dec 21, 2011 | past
|
| | With great power… (benlog.com) |
|
2 points by adambyrtek on June 13, 2011 | past
|
| | (your) information wants to be free (benlog.com) |
|
1 point by sjs on April 28, 2011 | past
|
| | Ben Adida on Dropbox security: "grab the pitchforks… again" (benlog.com) |
|
16 points by sweis on April 19, 2011 | past | 6 comments
|
| | Facebook, the Control Revolution, and the Failure of Applied Modern Cryptography (benlog.com) |
|
2 points by adambyrtek on Jan 15, 2011 | past
|
| | Browser extensions = user freedom (benlog.com) |
|
2 points by acj on June 7, 2010 | past
|
| | "If you’re outraged by accidental breaches, you’d better sit down" (benlog.com) |
|
58 points by sweis on May 17, 2010 | past | 19 comments
|
| | Steve Jobs's slight of hand (benlog.com) |
|
23 points by jbellis on April 29, 2010 | past | 9 comments
|
| | “It’s a tradeoff” and other uni-dimensional thinking (benlog.com) |
|
2 points by jbellis on April 4, 2010 | past | 3 comments
|
| | Don’t Hash Secrets (benlog.com) |
|
110 points by davidblair on Jan 28, 2010 | past | 46 comments
|
|
|
More |