For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
sweis's submissions
register
31.
Intel SGX for Dummies
(
intel.com
)
2 points
by
sweis
on Sept 28, 2013
|
past
32.
Thoughts on Intel's upcoming Software Guard Extensions (Part 2)
(
theinvisiblethings.blogspot.com
)
2 points
by
sweis
on Sept 23, 2013
|
past
33.
Prof. Matthew Green asked to remove NSA post by JHU dean
(
twitter.com/matthew_d_green
)
6 points
by
sweis
on Sept 9, 2013
|
past
|
2 comments
34.
Debian/Ubuntu root privilege escalation
(
cmpxchg8b.com
)
8 points
by
sweis
on Aug 23, 2013
|
past
|
1 comment
35.
ZMap: Internet scanner maps all of IPv4 in 45 minutes
(
zmap.io
)
207 points
by
sweis
on Aug 16, 2013
|
past
|
63 comments
36.
"Inside the Dropbox" attack to hijack Dropbox accounts
(
github.com/kholia
)
2 points
by
sweis
on Aug 15, 2013
|
past
37.
Australian Department of Defence denies ban on Lenovo PCs
(
defence.gov.au
)
2 points
by
sweis
on July 31, 2013
|
past
38.
Top security & crypto papers from the last 5 years
(
saweis.net
)
6 points
by
sweis
on July 26, 2013
|
past
|
1 comment
39.
Start-ups lean hard on CPU-based security to protect virtual environments
(
networkworld.com
)
2 points
by
sweis
on July 15, 2013
|
past
40.
Intel Enhanced Privacy ID
(
nist.gov
)
2 points
by
sweis
on July 14, 2013
|
past
|
1 comment
41.
Upcoming talk on hijacking Dropbox accounts
(
usenix.org
)
39 points
by
sweis
on July 12, 2013
|
past
|
13 comments
42.
"Engineering Security" by Peter Guttman book draft (2013)
(
auckland.ac.nz
)
1 point
by
sweis
on July 11, 2013
|
past
43.
Intel Trusted Execution Technology (TXT) privilege escalation vulnerability
(
intel.com
)
10 points
by
sweis
on July 11, 2013
|
past
|
1 comment
44.
MIT Ascend oblivious RAM prevents memory access pattern leakage
(
web.mit.edu
)
3 points
by
sweis
on July 2, 2013
|
past
|
1 comment
45.
The SIMON and SPECK Families of Lightweight Block Ciphers
(
iacr.org
)
46 points
by
sweis
on June 20, 2013
|
past
|
45 comments
46.
Physical memory attack and defense resources
(
privatecore.com
)
2 points
by
sweis
on June 10, 2013
|
past
|
1 comment
47.
Wi-Vi: See Through Walls with Wi-Fi Signals
(
csail.mit.edu
)
3 points
by
sweis
on June 6, 2013
|
past
48.
NandX: Hiding and finding data with NAND flash error codes
(
github.com/monk-dot
)
2 points
by
sweis
on April 10, 2013
|
past
49.
AES cache-timing attacks viable on phones
(
iacr.org
)
1 point
by
sweis
on March 30, 2013
|
past
50.
"Cryptography Worst Practices" slides by djb
(
cr.yp.to
)
2 points
by
sweis
on March 27, 2013
|
past
51.
New session of Stanford's online crypto course by Dan Boneh
(
coursera.org
)
1 point
by
sweis
on March 24, 2013
|
past
|
1 comment
52.
PrivExec: Private Execution as an Operating System Service
(
neu.edu
)
1 point
by
sweis
on March 8, 2013
|
past
|
1 comment
53.
Cold boot attack against Android phones
(
uni-erlangen.de
)
3 points
by
sweis
on Feb 14, 2013
|
past
54.
Security Engineering – The Book
(
cam.ac.uk
)
120 points
by
sweis
on Feb 9, 2013
|
past
|
12 comments
55.
Lessons Learned From Previous SSL/TLS Attacks
(
iacr.org
)
24 points
by
sweis
on Feb 1, 2013
|
past
|
3 comments
56.
A brief chronology of SSL/TLS attacks
(
armoredbarista.blogspot.de
)
2 points
by
sweis
on Feb 1, 2013
|
past
57.
Google Application Security 0x0A List Hall of Fame
(
google.com
)
1 point
by
sweis
on Dec 23, 2012
|
past
58.
"Office Space" creator Mike Judge shooting new HBO parody of Silicon Valley
(
deadline.com
)
329 points
by
sweis
on Dec 8, 2012
|
past
|
115 comments
59.
Public Key Pinning Extension for HTTP
(
ietf.org
)
2 points
by
sweis
on Dec 7, 2012
|
past
60.
SFFT: Sparse Fast Fourier Transform
(
csail.mit.edu
)
2 points
by
sweis
on Dec 3, 2012
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.