2How White Hat Hackers Stole Crypto Keys from an Offline Laptop in Another Room (opens in new tab)(motherboard.vice.com)2zorlem10y ago0
3What Bitcoin Transactions Get Crowded Out If Blocks Fill? (opens in new tab)(rusty.ozlabs.org)1zorlem10y ago0
4How Okta Chased Down Severe System CPU Contention in MySQL (opens in new tab)(developer.okta.com)2zorlem10y ago0
6Hard Truths about the Hard Task of finding Good Random Numbers (opens in new tab)(iang.org)1zorlem12y ago0
7Hard Truths About the Hard Business of Finding Hard Random Numbers (opens in new tab)(financialcryptography.com)3zorlem12y ago0
8Right of privacy: We are all Satoshi Nakamoto (opens in new tab)(financialcryptography.com)1zorlem12y ago0
9Easily migrate/import projects from Google Code to SourceForge (opens in new tab)(sourceforge.net)3zorlem12y ago0
10Sharing secrets and distributing passwords: Shamir's Algorithm (opens in new tab)(datagenetics.com)3zorlem12y ago1
111,000 SysAdmins Can Copy Any NSA Document Without Any Trace (opens in new tab)(techdirt.com)3zorlem12y ago0