Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Preventing Initramfs Attacks in TPM-Based Disk Encryption (Part 1)(2023) (securityinnovation.com)
2 points by yanko 9 months ago | past
Repo Jacking: Exploiting the Dependency Supply Chain (securityinnovation.com)
6 points by indianamoreau on Oct 28, 2020 | past | 1 comment
Blockchain CTF Version 2 (securityinnovation.com)
5 points by mickayz on Dec 13, 2018 | past
Show HN: Smart Contract Security CTF (Capture the Flag) on the Ropsten Testnet (securityinnovation.com)
6 points by mickayz on April 19, 2018 | past | 1 comment
In Defense of Reverse Engineering and Responsible Disclosure (securityinnovation.com)
4 points by joebasirico on Aug 29, 2015 | past
Calling All Cryptographers – NTRU Challenge (securityinnovation.com)
1 point by kaljskfjsalkf on May 23, 2015 | past
NTRU Encryption Cracking Challenge (securityinnovation.com)
2 points by joebasirico on Feb 3, 2015 | past
PGPy v0.3.0 Released – OpenPGP Implementation in Python (securityinnovation.com)
5 points by cdine on Dec 1, 2014 | past | 1 comment
What Makes a Good Security Tester: An Evil Streak (part 4 of 4) (securityinnovation.com)
1 point by joebasirico on April 24, 2012 | past
Online privacy is dead... if you let it die. (securityinnovation.com)
33 points by joebasirico on Oct 12, 2011 | past | 2 comments
Learn about security from free online training (securityinnovation.com)
3 points by joebasirico on July 8, 2011 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: