Hacker Newsnew | past | comments | ask | show | jobs | submit | fejr's submissionslogin
1.64-bit OllyDbg is here ...almost. (ollydbg.de)
1 point by fejr on Oct 24, 2013 | past
2.SSL explained (infosecinstitute.com)
2 points by fejr on Oct 23, 2013 | past
3.Can I Be Trusted? (schneier.com)
142 points by fejr on Oct 23, 2013 | past | 52 comments
4.Defending Against Crypto Backdoors (schneier.com)
1 point by fejr on Oct 22, 2013 | past
5.The Trajectories of Government and Corporate Surveillance (schneier.com)
8 points by fejr on Oct 21, 2013 | past | 1 comment
6.NSA 'taped millions of French calls'; France summons the US ambassador in Paris. (lemonde.fr)
4 points by fejr on Oct 21, 2013 | past
7.Karen Sandler on Software Freedom (tuxradar.com)
2 points by fejr on Oct 11, 2013 | past
8.Pinczakko's Guide to AMI BIOS Reverse Engineering (sites.google.com)
3 points by fejr on Oct 11, 2013 | past
9.Scientists who share data publicly receive more citations (phys.org)
8 points by fejr on Oct 4, 2013 | past
10.Gen. Michael Hayden: I'd also thought of nominating Mr. Snowden [for a hit list] (arstechnica.com)
6 points by fejr on Oct 3, 2013 | past | 2 comments
11.PANDA: a Platform for Architecture-Neutral Dynamic Analysis (moyix.blogspot.com)
1 point by fejr on Sept 30, 2013 | past
12.Claudia Trevisan: I was handcuffed and arrested at Yale Law School (estadao.com.br)
2 points by fejr on Sept 29, 2013 | past
13.Sen. Ron Wyden: NSA 'repeatedly deceived the American people' (theguardian.com)
18 points by fejr on Sept 27, 2013 | past
14.The NSA is looking for a Civil Liberties & Privacy Officer. (schneier.com)
2 points by fejr on Sept 23, 2013 | past
15.Metadata Equals Surveillance (schneier.com)
1 point by fejr on Sept 23, 2013 | past
16.What Clayton Christensen got wrong (stratechery.com)
64 points by fejr on Sept 22, 2013 | past | 50 comments
17.More Thoughts on CPU backdoors (2009) (theinvisiblethings.blogspot.com)
19 points by fejr on Sept 22, 2013 | past | 1 comment
18.Inside the iPhone 5S - Chipworks (chipworks.com)
1 point by fejr on Sept 20, 2013 | past
19.The Curious Tale of Dual_EC_DRBG (cryptographyengineering.com)
11 points by fejr on Sept 19, 2013 | past | 1 comment
20.How old memories fade away (mit.edu)
1 point by fejr on Sept 18, 2013 | past
21.Linus Torvalds worries about how Linux will handle end of Moore's Law (arstechnica.com)
21 points by fejr on Sept 18, 2013 | past | 6 comments
22.California school district hires online monitoring firm to watch 13,000 students (arstechnica.com)
5 points by fejr on Sept 16, 2013 | past
23.Surreptitiously Tampering with Computer Chips (schneier.com)
1 point by fejr on Sept 16, 2013 | past
24.There are two Twitters; Only one is worth investing in. (stratechery.com)
3 points by fejr on Sept 16, 2013 | past
25.Fatal crypto flaw in some government-certified smartcards makes forgery a snap (arstechnica.com)
17 points by fejr on Sept 16, 2013 | past | 1 comment
26.Reforming the NSA (schneier.com)
7 points by fejr on Sept 16, 2013 | past
27.Qcloud (cnotmz.appspot.com)
2 points by fejr on Sept 14, 2013 | past
28.NIST "strongly" suggests dropping its own encryption standard (arstechnica.com)
291 points by fejr on Sept 13, 2013 | past | 56 comments
29.Managing multicore memory (mit.edu)
5 points by fejr on Sept 13, 2013 | past | 1 comment
30.Windows win32k.sys menus and some "close, but no cigar" bugs (vexillium.org)
2 points by fejr on Sept 13, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: