| | Crypto as in Crypto (2018) (benlog.com) |
| 2 points by Tomte on Aug 28, 2022 | past |
|
| | Crypto as in Crypto (2018) (benlog.com) |
| 2 points by Tomte on Feb 1, 2022 | past |
|
| | Crypto as in Crypto (2018) (benlog.com) |
| 2 points by Tomte on May 30, 2021 | past | 1 comment |
|
| | Crypto as in Crypto (2018) (benlog.com) |
| 1 point by Tomte on Feb 20, 2020 | past |
|
| | Crypto as in Crypto (2018) (benlog.com) |
| 1 point by Tomte on Aug 18, 2019 | past |
|
| | Don't Hash Secrets (2008) (benlog.com) |
| 2 points by gnanesh on March 22, 2019 | past |
|
| | Crypto as in Crypto (2018) (benlog.com) |
| 3 points by Tomte on March 12, 2019 | past |
|
| | Crypto as in Crypto (benlog.com) |
| 1 point by Tomte on Oct 19, 2018 | past |
|
| | Crypto as in Crypto (benlog.com) |
| 18 points by Tomte on April 15, 2018 | past | 23 comments |
|
| | Crypto as in Crypto (benlog.com) |
| 1 point by imartin2k on Jan 16, 2018 | past |
|
| | On Apple and the FBI (benlog.com) |
| 1 point by glhaynes on Feb 19, 2016 | past |
|
| | The responsibility we have as software engineers (benlog.com) |
| 193 points by ingve on May 24, 2015 | past | 130 comments |
|
| | Obama lets NTSB exploit widespread tire vulnerabilities (benlog.com) |
| 1 point by subleq on Jan 28, 2015 | past | 1 comment |
|
| | Letter to President Obama on Surveillance and Freedom (benlog.com) |
| 4 points by jervisfm on Aug 22, 2013 | past |
|
| | Security is hard, let’s improve the conversation (benlog.com) |
| 2 points by cramforce on Aug 11, 2013 | past |
|
| | Don’t Hash Secrets (2008) (benlog.com) |
| 78 points by pizza on June 13, 2013 | past | 34 comments |
|
| | No user is an island (benlog.com) |
| 1 point by fpgeek on June 13, 2013 | past |
|
| | Firefox is the Unlocked Browser (benlog.com) |
| 2 points by metajack on March 20, 2013 | past |
|
| | encryption is not gravy (benlog.com) |
| 61 points by vgnet on April 30, 2012 | past | 43 comments |
|
| | A simpler, webbier approach to Web Intents (or Activities) (benlog.com) |
| 1 point by feb on April 20, 2012 | past |
|
| | Encryption is (mostly) not magic (benlog.com) |
| 1 point by mbrubeck on Dec 21, 2011 | past |
|
| | With great power… (benlog.com) |
| 2 points by adambyrtek on June 13, 2011 | past |
|
| | (your) information wants to be free (benlog.com) |
| 1 point by sjs on April 28, 2011 | past |
|
| | Ben Adida on Dropbox security: "grab the pitchforks… again" (benlog.com) |
| 16 points by sweis on April 19, 2011 | past | 6 comments |
|
| | Facebook, the Control Revolution, and the Failure of Applied Modern Cryptography (benlog.com) |
| 2 points by adambyrtek on Jan 15, 2011 | past |
|
| | Browser extensions = user freedom (benlog.com) |
| 2 points by acj on June 7, 2010 | past |
|
| | "If you’re outraged by accidental breaches, you’d better sit down" (benlog.com) |
| 58 points by sweis on May 17, 2010 | past | 19 comments |
|
| | Steve Jobs's slight of hand (benlog.com) |
| 23 points by jbellis on April 29, 2010 | past | 9 comments |
|
| | “It’s a tradeoff” and other uni-dimensional thinking (benlog.com) |
| 2 points by jbellis on April 4, 2010 | past | 3 comments |
|
| | Don’t Hash Secrets (benlog.com) |
| 110 points by davidblair on Jan 28, 2010 | past | 46 comments |
|
|
| More |