Posts

Latest 50+ Beautiful Nature Images or Wallpapers

Download Latest 50+ Natural Love Images

Apple’s Password Storing Keychain Cracked on iOS & OS X

ProtonMail DDoS Attack – Sustained & Sophisticated

KeeFarce – Extract KeePass Passwords (2.x) From Database

ISIS Running 24-Hour Terrorist Crypto Help-desk

Dell Backdoor Root Cert – What You Need To Know

DROWN Attack on TLS – Everything You Need To Know

Up1 – Client Side Encrypted Image Host

SHA-256 and SHA3-256 Are Safe For the Foreseeable Future

Signal Messaging App Formal Audit Results Are Good

UK Encryption Backdoor Law Passed Via Investigatory Powers Act

Wycheproof – Test Crypto Libraries Against Known Attacks

China To Outlaw All Unapproved Darknet VPN Services

hashID – Identify Different Types of Hashes

ONIOFF – Onion URL Inspector

HashPump – Exploit Hash Length Extension Attack

European Commission Pushing For Encryption Backdoors

HashData – A Command-line Hash Identifying Tool

spectrology – Basic Audio Steganography Tool