-
This year in nom: 2.0 is here! 25 Nov 2016
-
A world without certificate authorities 21 Jul 2014
-
How to choose your secure messaging app 21 Feb 2014
-
Criterions for a crypto app 20 Dec 2013
-
Telegram, AKA "Stand back, we have Math PhDs!" 17 Dec 2013
-
SafeChat, P2P encrypted messages? 29 Oct 2013
-
The rules of security by obscurity 01 Oct 2013
-
Theoretical definitions for crypto wannabes 09 Aug 2013
-
Filter Rails JSON input with route constraints 06 Feb 2013
-
Looking for big architectures and adventurous sysadmins 30 Jan 2013
-
5 easy tips to accelerate SSL 25 Jan 2013
-
Harden Wordpress using database permissions 14 Jan 2013
-
Warning your users about a vulnerability 14 Nov 2012
-
Going to the freelance side 05 Nov 2012
-
Software security is like medicine 29 Aug 2012
-
Your data is precious 13 Jun 2012
-
Worst Case Messaging Protocol 05 Jan 2012
-
How to get a certificate signed by multiple certification authorities 18 Nov 2011
-
Rails and oauth-plugin part 2: the consumer 28 Jun 2011
-
Rails and oauth-plugin part 1: the provider 02 Jun 2011
-
Yet another authentication scheme 01 Apr 2011
-
Gorgeous spammer wants to add you as a friend 16 Nov 2010
-
Fixing the DLL loading vulnerability 23 Aug 2010
-
Current state of security in VLC on Windows 02 Jul 2010
-
Web vulnerabilities in an HTML 5 application 13 Jun 2010