|
|
| | Preventing Initramfs Attacks in TPM-Based Disk Encryption (Part 1)(2023) (securityinnovation.com) | | 2 points by yanko 9 months ago | past | |
| | Repo Jacking: Exploiting the Dependency Supply Chain (securityinnovation.com) | | 6 points by indianamoreau on Oct 28, 2020 | past | 1 comment | |
| | Blockchain CTF Version 2 (securityinnovation.com) | | 5 points by mickayz on Dec 13, 2018 | past | |
| | Show HN: Smart Contract Security CTF (Capture the Flag) on the Ropsten Testnet (securityinnovation.com) | | 6 points by mickayz on April 19, 2018 | past | 1 comment | |
| | In Defense of Reverse Engineering and Responsible Disclosure (securityinnovation.com) | | 4 points by joebasirico on Aug 29, 2015 | past | |
| | Calling All Cryptographers – NTRU Challenge (securityinnovation.com) | | 1 point by kaljskfjsalkf on May 23, 2015 | past | |
| | NTRU Encryption Cracking Challenge (securityinnovation.com) | | 2 points by joebasirico on Feb 3, 2015 | past | |
| | PGPy v0.3.0 Released – OpenPGP Implementation in Python (securityinnovation.com) | | 5 points by cdine on Dec 1, 2014 | past | 1 comment | |
| | What Makes a Good Security Tester: An Evil Streak (part 4 of 4) (securityinnovation.com) | | 1 point by joebasirico on April 24, 2012 | past | |
| | Online privacy is dead... if you let it die. (securityinnovation.com) | | 33 points by joebasirico on Oct 12, 2011 | past | 2 comments | |
| | Learn about security from free online training (securityinnovation.com) | | 3 points by joebasirico on July 8, 2011 | past | 1 comment | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|