| | Anatomy of Passwords (lightbluetouchpaper.org) |
| 1 point by dc352 on July 13, 2016 | past |
|
| | The tech industry and Brexit (lightbluetouchpaper.org) |
| 1 point by etiam on June 20, 2016 | past |
|
| | Adblocking and Counter-Blocking: A Slice of the Arms Race (lightbluetouchpaper.org) |
| 4 points by stargrave on May 28, 2016 | past | 1 comment |
|
| | GCHQ helps banks dump fraud losses on customers (lightbluetouchpaper.org) |
| 4 points by AlexandrP on May 27, 2016 | past |
|
| | A dubious cyber security conference (lightbluetouchpaper.org) |
| 2 points by CapitalistCartr on May 3, 2016 | past |
|
| | “Do you see what I see?” ask Tor users, rejected as sites accept non-Tor users (lightbluetouchpaper.org) |
| 2 points by etiam on Feb 23, 2016 | past |
|
| | Can we crowdsource trust? (lightbluetouchpaper.org) |
| 2 points by temp on Feb 17, 2016 | past |
|
| | Evidence for a looming UK cyber crime strike week (lightbluetouchpaper.org) |
| 2 points by jldugger on Feb 12, 2016 | past |
|
| | Arresting development?: no arrests or charges for cybercrime events in the UK (lightbluetouchpaper.org) |
| 3 points by etiam on Feb 12, 2016 | past | 1 comment |
|
| | Snoopers’ Charter 2.0 (lightbluetouchpaper.org) |
| 3 points by etiam on Dec 7, 2015 | past |
|
| | Internet of Bad Things (lightbluetouchpaper.org) |
| 4 points by etiam on Nov 13, 2015 | past |
|
| | Efficient statistical techniques for extracting secrets from electronic devices (lightbluetouchpaper.org) |
| 2 points by etiam on Nov 12, 2015 | past |
|
| | A one-line software patent – and a fix (lightbluetouchpaper.org) |
| 1 point by superbatfish on Nov 6, 2015 | past |
|
| | Emerging, fascinating, and disruptive views of quantum mechanics (lightbluetouchpaper.org) |
| 2 points by etiam on Oct 28, 2015 | past |
|
| | 87% Android devices insecure because mfrs. fail to provide security updates (lightbluetouchpaper.org) |
| 3 points by r0h1n on Oct 21, 2015 | past | 2 comments |
|
| | 87% of Android devices insecure (lightbluetouchpaper.org) |
| 3 points by oc243 on Oct 8, 2015 | past |
|
| | Thinking of selling your old Android phone? Watch out (lightbluetouchpaper.org) |
| 3 points by _jomo on May 22, 2015 | past |
|
| | Meeting Snowden in Princeton (lightbluetouchpaper.org) |
| 111 points by zmanian on May 2, 2015 | past | 12 comments |
|
| | There exists a classical model of the photon after all (lightbluetouchpaper.org) |
| 170 points by inglesp on Feb 23, 2015 | past | 84 comments |
|
| | Financial Cryptography 2015 Liveblog (lightbluetouchpaper.org) |
| 2 points by fredley on Jan 26, 2015 | past |
|
| | Curfew tags – the gory details (lightbluetouchpaper.org) |
| 2 points by anon1385 on Dec 14, 2014 | past |
|
| | Paper on EMV transaction security (lightbluetouchpaper.org) |
| 1 point by k4jh on Nov 19, 2014 | past |
|
| | Largest ever civil government IT disaster (lightbluetouchpaper.org) |
| 2 points by emilsoman on Aug 14, 2014 | past |
|
| | Pico part I: a project to replace passwords (lightbluetouchpaper.org) |
| 1 point by moreati on Aug 14, 2014 | past |
|
| | Chip and Skim: cloning EMV cards with the pre-play attack (2012) (lightbluetouchpaper.org) |
| 1 point by ivank on Aug 7, 2014 | past |
|
| | CHERI: A RISC Processor with Hardware-Integrated Memory Protection (lightbluetouchpaper.org) |
| 1 point by jibcage on July 16, 2014 | past |
|
| | EMV - why payment systems fail (lightbluetouchpaper.org) |
| 1 point by altro on July 4, 2014 | past |
|
| | The CHERI capability model: Revisiting RISC in an age of risk (lightbluetouchpaper.org) |
| 2 points by kneth on July 4, 2014 | past |
|
| | A Study of Whois Privacy and Proxy Service Abuse (lightbluetouchpaper.org) |
| 1 point by jcr on June 28, 2014 | past |
|
| | Don’t shoot the demonstrators (lightbluetouchpaper.org) |
| 1 point by etiam on June 24, 2014 | past |
|
|
| More |