Hacker Newsnew | past | comments | ask | show | jobs | submit | conorpp's submissionslogin
1.Helping secure Binance Chain through responsible disclosure (jumpcrypto.com)
1 point by conorpp on Feb 24, 2023 | past
2.Trussed – a new Rust framework for security chips that could replace JavaCard (trussed.dev)
27 points by conorpp on Feb 21, 2021 | past | 2 comments
3.FIDO2 security key company releases hardware that's open source and uses Rust (solokeys.com)
396 points by conorpp on Feb 12, 2021 | past | 157 comments
4.FIDO2 security key company publishes results of internal security audit (doyensec.com)
136 points by conorpp on Feb 20, 2020 | past | 63 comments
5.Trusting digital images to not be fake or altered (conorpp.com)
1 point by conorpp on Feb 3, 2020 | past
6.A survey of open and secure microcontrollers (conorpp.com)
2 points by conorpp on July 29, 2019 | past
7.Things you should definitely do when setting up a product line (conorpp.com)
1 point by conorpp on July 29, 2019 | past
8.Designing Somu, a tiny security key (conorpp.com)
3 points by conorpp on May 16, 2019 | past
9.Show HN: FIDO2 USB+NFC token optimized for security, extensibility, and style (github.com/solokeyssec)
11 points by conorpp on Sept 14, 2018 | past
10.Designing Solo, a New U2F/FIDO2 Token (conorpp.com)
3 points by conorpp on Aug 23, 2018 | past
11.U2F Zero sales on Amazon year in review (conorpp.com)
6 points by conorpp on Oct 8, 2017 | past
12.Designing and Producing 2FA tokens to Sell on Amazon (conorpp.com)
255 points by conorpp on Sept 25, 2016 | past | 109 comments
13.Show HN: A secure, open source U2F token you can make with $4.5 worth of parts (github.com/conorpp)
267 points by conorpp on June 22, 2016 | past | 92 comments
14.Pearson Educations exploitable method for checking homework answers (conorpp.com)
1 point by conorpp on May 29, 2016 | past
15.My experience with DirtyPCBS.com (conorpp.com)
1 point by conorpp on March 13, 2016 | past
16.Keyak: a candidate for the authenticated encryption standard (conorpp.com)
3 points by conorpp on Feb 20, 2016 | past
17.Security and usage of Braintree, a PayPal backed payment gateway API (conorpp.com)
1 point by conorpp on Jan 10, 2016 | past
18.How to accelerate a program using hardware (conorpp.com)
36 points by conorpp on Dec 17, 2015 | past | 9 comments
19.Linx: the filesharing server every hacker should know about (conorpp.com)
12 points by conorpp on Nov 9, 2015 | past
20.Trying out Let's Encrypt (beta) (conorpp.com)
104 points by conorpp on Nov 5, 2015 | past | 51 comments
21.A close look at an operating botnet (conorpp.com)
50 points by conorpp on Oct 11, 2015 | past | 4 comments
22.How to Fix a Corrupted File by Brute Force (conorpp.com)
1 point by conorpp on Sept 28, 2015 | past
23.Proxying Bluetooth devices for security analysis using btproxy (conorpp.com)
3 points by conorpp on Sept 7, 2015 | past
24.How to support PGP encryption in Gmail (conorpp.com)
113 points by conorpp on Aug 26, 2015 | past | 49 comments
25.How I grew up in Maine and ended up here (in progress) (conorpp.com)
1 point by conorpp on July 30, 2014 | past
26.How to quickly install a backdoor relay with netcat (gist.github.com)
1 point by conorpp on April 13, 2014 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: