For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | sweis's submissionsregister
31.Intel SGX for Dummies (intel.com)
2 points by sweis on Sept 28, 2013 | past
32.Thoughts on Intel's upcoming Software Guard Extensions (Part 2) (theinvisiblethings.blogspot.com)
2 points by sweis on Sept 23, 2013 | past
33.Prof. Matthew Green asked to remove NSA post by JHU dean (twitter.com/matthew_d_green)
6 points by sweis on Sept 9, 2013 | past | 2 comments
34.Debian/Ubuntu root privilege escalation (cmpxchg8b.com)
8 points by sweis on Aug 23, 2013 | past | 1 comment
35.ZMap: Internet scanner maps all of IPv4 in 45 minutes (zmap.io)
207 points by sweis on Aug 16, 2013 | past | 63 comments
36."Inside the Dropbox" attack to hijack Dropbox accounts (github.com/kholia)
2 points by sweis on Aug 15, 2013 | past
37.Australian Department of Defence denies ban on Lenovo PCs (defence.gov.au)
2 points by sweis on July 31, 2013 | past
38.Top security & crypto papers from the last 5 years (saweis.net)
6 points by sweis on July 26, 2013 | past | 1 comment
39.Start-ups lean hard on CPU-based security to protect virtual environments (networkworld.com)
2 points by sweis on July 15, 2013 | past
40.Intel Enhanced Privacy ID (nist.gov)
2 points by sweis on July 14, 2013 | past | 1 comment
41.Upcoming talk on hijacking Dropbox accounts (usenix.org)
39 points by sweis on July 12, 2013 | past | 13 comments
42."Engineering Security" by Peter Guttman book draft (2013) (auckland.ac.nz)
1 point by sweis on July 11, 2013 | past
43.Intel Trusted Execution Technology (TXT) privilege escalation vulnerability (intel.com)
10 points by sweis on July 11, 2013 | past | 1 comment
44.MIT Ascend oblivious RAM prevents memory access pattern leakage (web.mit.edu)
3 points by sweis on July 2, 2013 | past | 1 comment
45.The SIMON and SPECK Families of Lightweight Block Ciphers (iacr.org)
46 points by sweis on June 20, 2013 | past | 45 comments
46.Physical memory attack and defense resources (privatecore.com)
2 points by sweis on June 10, 2013 | past | 1 comment
47.Wi-Vi: See Through Walls with Wi-Fi Signals (csail.mit.edu)
3 points by sweis on June 6, 2013 | past
48.NandX: Hiding and finding data with NAND flash error codes (github.com/monk-dot)
2 points by sweis on April 10, 2013 | past
49.AES cache-timing attacks viable on phones (iacr.org)
1 point by sweis on March 30, 2013 | past
50."Cryptography Worst Practices" slides by djb (cr.yp.to)
2 points by sweis on March 27, 2013 | past
51.New session of Stanford's online crypto course by Dan Boneh (coursera.org)
1 point by sweis on March 24, 2013 | past | 1 comment
52.PrivExec: Private Execution as an Operating System Service (neu.edu)
1 point by sweis on March 8, 2013 | past | 1 comment
53.Cold boot attack against Android phones (uni-erlangen.de)
3 points by sweis on Feb 14, 2013 | past
54.Security Engineering – The Book (cam.ac.uk)
120 points by sweis on Feb 9, 2013 | past | 12 comments
55.Lessons Learned From Previous SSL/TLS Attacks (iacr.org)
24 points by sweis on Feb 1, 2013 | past | 3 comments
56.A brief chronology of SSL/TLS attacks (armoredbarista.blogspot.de)
2 points by sweis on Feb 1, 2013 | past
57.Google Application Security 0x0A List Hall of Fame (google.com)
1 point by sweis on Dec 23, 2012 | past
58."Office Space" creator Mike Judge shooting new HBO parody of Silicon Valley (deadline.com)
329 points by sweis on Dec 8, 2012 | past | 115 comments
59.Public Key Pinning Extension for HTTP (ietf.org)
2 points by sweis on Dec 7, 2012 | past
60.SFFT: Sparse Fast Fourier Transform (csail.mit.edu)
2 points by sweis on Dec 3, 2012 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You