Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Anatomy of Passwords (lightbluetouchpaper.org)
1 point by dc352 on July 13, 2016 | past
The tech industry and Brexit (lightbluetouchpaper.org)
1 point by etiam on June 20, 2016 | past
Adblocking and Counter-Blocking: A Slice of the Arms Race (lightbluetouchpaper.org)
4 points by stargrave on May 28, 2016 | past | 1 comment
GCHQ helps banks dump fraud losses on customers (lightbluetouchpaper.org)
4 points by AlexandrP on May 27, 2016 | past
A dubious cyber security conference (lightbluetouchpaper.org)
2 points by CapitalistCartr on May 3, 2016 | past
“Do you see what I see?” ask Tor users, rejected as sites accept non-Tor users (lightbluetouchpaper.org)
2 points by etiam on Feb 23, 2016 | past
Can we crowdsource trust? (lightbluetouchpaper.org)
2 points by temp on Feb 17, 2016 | past
Evidence for a looming UK cyber crime strike week (lightbluetouchpaper.org)
2 points by jldugger on Feb 12, 2016 | past
Arresting development?: no arrests or charges for cybercrime events in the UK (lightbluetouchpaper.org)
3 points by etiam on Feb 12, 2016 | past | 1 comment
Snoopers’ Charter 2.0 (lightbluetouchpaper.org)
3 points by etiam on Dec 7, 2015 | past
Internet of Bad Things (lightbluetouchpaper.org)
4 points by etiam on Nov 13, 2015 | past
Efficient statistical techniques for extracting secrets from electronic devices (lightbluetouchpaper.org)
2 points by etiam on Nov 12, 2015 | past
A one-line software patent – and a fix (lightbluetouchpaper.org)
1 point by superbatfish on Nov 6, 2015 | past
Emerging, fascinating, and disruptive views of quantum mechanics (lightbluetouchpaper.org)
2 points by etiam on Oct 28, 2015 | past
87% Android devices insecure because mfrs. fail to provide security updates (lightbluetouchpaper.org)
3 points by r0h1n on Oct 21, 2015 | past | 2 comments
87% of Android devices insecure (lightbluetouchpaper.org)
3 points by oc243 on Oct 8, 2015 | past
Thinking of selling your old Android phone? Watch out (lightbluetouchpaper.org)
3 points by _jomo on May 22, 2015 | past
Meeting Snowden in Princeton (lightbluetouchpaper.org)
111 points by zmanian on May 2, 2015 | past | 12 comments
There exists a classical model of the photon after all (lightbluetouchpaper.org)
170 points by inglesp on Feb 23, 2015 | past | 84 comments
Financial Cryptography 2015 Liveblog (lightbluetouchpaper.org)
2 points by fredley on Jan 26, 2015 | past
Curfew tags – the gory details (lightbluetouchpaper.org)
2 points by anon1385 on Dec 14, 2014 | past
Paper on EMV transaction security (lightbluetouchpaper.org)
1 point by k4jh on Nov 19, 2014 | past
Largest ever civil government IT disaster (lightbluetouchpaper.org)
2 points by emilsoman on Aug 14, 2014 | past
Pico part I: a project to replace passwords (lightbluetouchpaper.org)
1 point by moreati on Aug 14, 2014 | past
Chip and Skim: cloning EMV cards with the pre-play attack (2012) (lightbluetouchpaper.org)
1 point by ivank on Aug 7, 2014 | past
CHERI: A RISC Processor with Hardware-Integrated Memory Protection (lightbluetouchpaper.org)
1 point by jibcage on July 16, 2014 | past
EMV - why payment systems fail (lightbluetouchpaper.org)
1 point by altro on July 4, 2014 | past
The CHERI capability model: Revisiting RISC in an age of risk (lightbluetouchpaper.org)
2 points by kneth on July 4, 2014 | past
A Study of Whois Privacy and Proxy Service Abuse (lightbluetouchpaper.org)
1 point by jcr on June 28, 2014 | past
Don’t shoot the demonstrators (lightbluetouchpaper.org)
1 point by etiam on June 24, 2014 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: