Hacker News new | past | comments | ask | show | jobs | submit | from login
Crypto as in Crypto (2018) (benlog.com)
2 points by Tomte on Aug 28, 2022 | past
Crypto as in Crypto (2018) (benlog.com)
2 points by Tomte on Feb 1, 2022 | past
Crypto as in Crypto (2018) (benlog.com)
2 points by Tomte on May 30, 2021 | past | 1 comment
Crypto as in Crypto (2018) (benlog.com)
1 point by Tomte on Feb 20, 2020 | past
Crypto as in Crypto (2018) (benlog.com)
1 point by Tomte on Aug 18, 2019 | past
Don't Hash Secrets (2008) (benlog.com)
2 points by gnanesh on March 22, 2019 | past
Crypto as in Crypto (2018) (benlog.com)
3 points by Tomte on March 12, 2019 | past
Crypto as in Crypto (benlog.com)
1 point by Tomte on Oct 19, 2018 | past
Crypto as in Crypto (benlog.com)
18 points by Tomte on April 15, 2018 | past | 23 comments
Crypto as in Crypto (benlog.com)
1 point by imartin2k on Jan 16, 2018 | past
On Apple and the FBI (benlog.com)
1 point by glhaynes on Feb 19, 2016 | past
The responsibility we have as software engineers (benlog.com)
193 points by ingve on May 24, 2015 | past | 130 comments
Obama lets NTSB exploit widespread tire vulnerabilities (benlog.com)
1 point by subleq on Jan 28, 2015 | past | 1 comment
Letter to President Obama on Surveillance and Freedom (benlog.com)
4 points by jervisfm on Aug 22, 2013 | past
Security is hard, let’s improve the conversation (benlog.com)
2 points by cramforce on Aug 11, 2013 | past
Don’t Hash Secrets (2008) (benlog.com)
78 points by pizza on June 13, 2013 | past | 34 comments
No user is an island (benlog.com)
1 point by fpgeek on June 13, 2013 | past
Firefox is the Unlocked Browser (benlog.com)
2 points by metajack on March 20, 2013 | past
encryption is not gravy (benlog.com)
61 points by vgnet on April 30, 2012 | past | 43 comments
A simpler, webbier approach to Web Intents (or Activities) (benlog.com)
1 point by feb on April 20, 2012 | past
Encryption is (mostly) not magic (benlog.com)
1 point by mbrubeck on Dec 21, 2011 | past
With great power… (benlog.com)
2 points by adambyrtek on June 13, 2011 | past
(your) information wants to be free (benlog.com)
1 point by sjs on April 28, 2011 | past
Ben Adida on Dropbox security: "grab the pitchforks… again" (benlog.com)
16 points by sweis on April 19, 2011 | past | 6 comments
Facebook, the Control Revolution, and the Failure of Applied Modern Cryptography (benlog.com)
2 points by adambyrtek on Jan 15, 2011 | past
Browser extensions = user freedom (benlog.com)
2 points by acj on June 7, 2010 | past
"If you’re outraged by accidental breaches, you’d better sit down" (benlog.com)
58 points by sweis on May 17, 2010 | past | 19 comments
Steve Jobs's slight of hand (benlog.com)
23 points by jbellis on April 29, 2010 | past | 9 comments
“It’s a tradeoff” and other uni-dimensional thinking (benlog.com)
2 points by jbellis on April 4, 2010 | past | 3 comments
Don’t Hash Secrets (benlog.com)
110 points by davidblair on Jan 28, 2010 | past | 46 comments

Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: