Pages Tagged: log
- 2025/07 Rearrangements and Curation
log
- 2025/02 Senary Static Code Repo
log
tools
project
- 2024/12 Reqon - plain text requirements modelling through executable constraints
log
tools
project
requirements
- 2024/09 Ricochet Refresh - UI Redressing / Shared File Names can contained HTML
log
sec-research
privacy-research
- 2024/08 Any client can crash hyprland by truncating fd buffers (Lack of SIGBUS handling)
log
sec-research
- 2024/08 Nyctal - a tiny, zero dependency, Wayland Compositor
log
project
osdev
- 2024/06 OS Thoughts 1
operating-systems
activity
log
- 2024/05 On the application of Bloom Filter Hierarchies representing Sub-word Token Bigram Occurrence to Probabilistic Full Text Search
decentralized-search
activity
decentralization
log
paper
- 2024/05 Aurora
photos
astrophotography
astronomy
event
log
- 2024/05 SecureDrop Protocol Puzzlement
thoughts
metadata resistance
privacy
log
- 2024/04 Read: Tor by Ben Collier
reading-list
log
- 2024/04 Please Steal these Project/Research Ideas
ideas
metadata resistance
privacy
log
- 2024/04 Saffron Requirement Patterns
saffron
activity
formal-verification
ideas
project
log
- 2024/04 Hello World
meta
activity
log
- 2024/03 Notes on Decentralized Search
decentralized-search
decentralization
activity
log
paper
- 2023/12 Disclosing a Signal Desktop UI Redressing Issue
log
sec-research
privacy-research
- 2023/09 Quiet - Arbitrary File Write (leading to code execution)
log
sec-research
privacy-research
- 2022/12 Obsidian - Malicious Websites can access internal Obsidian URIs
log
sec-research
privacy-research
- 2022/08 Thunderbird Decryption Oracle
log
sec-research
crypto-research
privacy-research
- 2021/11 Writing a Fuzzer for Nes Games
log
sec-research
project
fuzzing
- 2021/08 Building a Home-made Hydrogen Line Telescope
log
radioastronomy
astronomy
project
- 2021/08 NeuralHash, Semantics, Collisions and You (or When is a Cat a Dog?)
log
privacy-research
- 2021/08 Revisiting First Impressions: Apple, Parameters and Fuzzy Threshold PSI
log
privacy-research
- 2021/08 A Closer Look at Fuzzy Threshold PSI (ftPSI-AD)
log
privacy-research
- 2021/08 Obfuscated Apples
log
privacy-research
- 2021/02 FuzzyTags
log
privacy-research
project
- 2020/05 How not to prove your election outcome
crypto-research
evoting
log
conference
privacy-research
paper
- 2020/03 Zecwallet Lite Critical MITM Vulnerability
log
sec-research
privacy-research
- 2020/03 Zecwallet Lite Nonce Reuse Issue
log
sec-research
privacy-research
- 2020/02 Zecwallet, Electron and Deanonymization
log
privacy-research
- 2019/11 Zecwallet HTML Rendering in Memos and the possibility of Phishing Attacks
log
sec-research
- 2019/10 Sarah’s Adventures in Switzerland
slides
log
evoting
- 2019/07 Knights and knaves run elections: Internet voting and undetectable electoral fraud
crypto-research
evoting
log
privacy-research
paper
- 2019/03 Addendum to How not to prove your election outcome
crypto-research
evoting
log
privacy-research
paper
- 2019/03 How not to prove your election outcome
crypto-research
evoting
privacy-research
log
paper
- 2019/03 Ceci n’est pas une preuve
crypto-research
evoting
log
privacy-research
paper
- 2018/07 Taxis, Tonics and Tokens
slides
log
- 2018/06 Cwtch - decentralized, privacy-preserving, multi-party messaging protocol/app
log
sec-research
privacy-research
project
- 2017/12 Flaws in Smart Toys Marketed to Children
sec-research
privacy-research
log
- 2017/05 Queer Privacy
privacy-research
log
- 2017/02 OnionScan Report: Freedom Hosting II, A New Map and a New Direction.
privacy-research
log
onionscan
- 2017/01 OnionScan Report: Reconstructing the Finances of Darknet Markets through Reputation Systems
privacy-research
log
onionscan
- 2016/10 OnionScan Report: This One Weird Trick Can Reveal Information from 25% of the Dark Web
privacy-research
log
onionscan
sec-research
- 2016/09 OnionScan Report: September 2016 - Uptime, Downtime and Freedom Hosting II
privacy-research
log
onionscan
- 2016/08 OnionScan Report: August 2016 - Revisiting CARONTE; Analytics, Bitcoins and Correlations
privacy-research
log
onionscan
- 2016/07 OnionScan Report: July 2016 - HTTPS Somewhere Sometimes
privacy-research
log
onionscan
- 2016/06 OnionScan Report June 2016 - Snapshots of the Dark Web
privacy-research
log
onionscan
- 2016/05 OnionScan Report: May 2016 - Technologies used by Onion Services
privacy-research
log
onionscan
- 2016/04 OnionScan Report: April 2016 - The Tor Network: Security and Crime
privacy-research
log
onionscan
- 2015/11 Github - Profile Email Address not Validated
sec-research
log