
Nostr events are the database
🔔 This profile hasn't been claimed yet. If this is your Nostr profile, you can claim it.
EditNostr events are the database
Highly event-driven, cypherpunk
When Google announced an intent to revoke trust from certificates issued by Symantec, this set off alarm bells all over the certificate authority industry. But that was March. What actually happened? Rendition Infosec has periodically tracked the SSL certificates on the Alexa top 1 million sites. In this talk, we’ll review that data set and examine what, if any, changes the Google announcement regarding Symantec certs had on certificate renewal/reissuance. We’ll also offer realistic suggestions for revoking trust in the future – had this been an actual fire drill, we’d have been burned alive.
You’re a plaintext Nostr-punk.
Crypto has served an important role in securing sensitive data throughout the years, but ransomware has flipped this script on its head by leveraging crypto as a means to instead prevent users from accessing their own data. The crypto seen in ransomware covers a wide range of complexity of symmetric and asymmetric algorithms, but flaws in their implementation and key storage / transmission routines have left the door open for users to retrieve their data in certain cases. In this talk, I'll provide a glimpse into some of the more notable ransomware crypto implementations that have surfaced over the past few years and how their weaknesses were exploited by security researchers through reverse engineering and cryptanalysis.
https://youtu.be/m0cF8QysNbM
You want to design customer-focused, easy-to-use products that your customers will love - but you aren’t doing your job if you wait until the last minute (or beyond!) to think about privacy. Tacking on privacy features as an afterthought isn’t only bad for your users, it’s also bad for your company. Privacy starts with your backend systems and carries forward through your product development cycle, your user testing, your product release, and all the way to your customer support. Learn how to build privacy into your products from the ground up, and create an awesome privacy story for both your company and your users.
https://youtu.be/AxeMeghSOUQ
#STROBE Since Keccak has been selected as the winner of the SHA-3 competition in 2012, a myriad of different hash functions have been trending. From BLAKE2 to KangarooTwelve we'll cover what hash functions are out there, what is being used, and what you should use. Extending hash functions, we’ll also discover STROBE, a symmetric protocol framework derived from SHA-3.
Naomi Brockwell
Ways you can be surveilled, at home techniques you can use to protect yourself when using your phone and computer, and individual privacy rights within a marriage.
https://plaintextproject.online
Supply Chain Attacks are such a big vector
Solving the usability problem and the current move to elliptic curve based cryptography allows Internet security to move beyond the limited cryptographic primitives used in TLS, SSH, and OpenPGP. Public key encryption offers more than just encryption and signatures. Future message encryption schemes will allow end-to-end secure communication within groups of users without the sender having to create decryption material for each intended recipient
not so quick my friend
Solving the usability problem and the current move to elliptic curve based cryptography allows Internet security to move beyond the limited cryptographic primitives used in TLS, SSH, and OpenPGP. Public key encryption offers more than just encryption and signatures. Future message encryption schemes will allow end-to-end secure communication within groups of users without the sender having to create decryption material for each intended recipient https://archive.org/download/livestream-131174758/The_Mathematical_Mesh_and_the_New_Cryptography-131174758.mpeg
Try Nostr view in deta space
Your ISP is tracking you
Can you run Alby hub? Self host it?
Regardless what happens the Central Bank will come out stronger from it
Welcome to Our Bitcoin Store We are a small, passionate team dedicated to providing quality Bitcoin-focused tools and accessories. Our current offerings include: Bitcoin wallets Seed storage plates Nostr signing devices ESP32 miners 3D-printed cases and hardware Satscards & Boltzcards As we grow, so will our inventory and expertise in serving you. If you're interested in any of our products, please feel free to inquire about shipping. Thank you for your support! ⚡ Onchain Ecash Layer-2 Liquid Accepted ☆.𓋼𓍊 𓆏 𓍊𓋼𓍊.☆ ⠀⠀⠀⠀⣿⡇⠀⢸⣿⡇⠀⠀⠀⠀ ⠸⠿⣿⣿⣿⡿⠿⠿⣿⣿⣿⣶⣄⠀ ⠀⠀⢸⣿⣿⡇⠀⠀⠀⠈⣿⣿⣿⠀ ⠀⠀⢸⣿⣿⡇⠀⠀⢀⣠⣿⣿⠟⠀ ⠀⠀⢸⣿⣿⡿⠿⠿⠿⣿⣿⣥⣄⠀ ⠀⠀⢸⣿⣿⡇⠀⠀⠀⠀⢻⣿⣿⣧ ⠀⠀⢸⣿⣿⡇⠀⠀⠀⠀⣼⣿⣿⣿ ⢰⣶⣿⣿⣿⣷⣶⣶⣾⣿⣿⠿⠛⠁ ⠀⠀⠀⠀⣿⡇⠀⢸⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ 🌐 Let's Connect: Npub Address: [email protected] Email Address: https://flowcrypt.com/me/parityday Lightning Address: [email protected] [email protected] Shalom Pretty Print Analytics https://shalom-nosprint.pgs.sh/pretty.html Shalom Book Club ( Will Rotate Books When I Can) Happy Reading https://shalom-hypatia.pgs.sh/index.html Shalom Npub Reader https://shalom-site.pgs.sh/feed.html Blogs- https://haven.libretechsystems.xyz/ (Haven, Open Source) https://memos.eshgham.one/ (Memos, Open Source) https://freedomtech.eshgham.one https://ublog.libretechsystems.xyz https://nblog.libretechsystems.xyz https://zoryaprivacy.libretechsystems.xyz/ https://sigmaenterprise.github.io/ Podcast https://freedomtech.eshgham.one/episodes Store Page (Hosted On Blossom servers) https://w3.do/uALvGfWz Lightning Layer Hash https://w3.do/P95otzTc Lightning Layer Hash Books https://w3.do/bepcT-KZ Hosting Plans https://w3.do/KKrjIv8o (All Prices in TTD) Payment is Bitcoin and Lightning Feel free to reach out for collaboration opportunities, inquiries, or just to say hello! 🚀✨