Hacker Newsnew | past | comments | ask | show | jobs | submit | more viralpoetry's commentslogin

I occasionally write about security, mostly about applied cryptography from non-math perspective.

If you are interested on day to day work in financial cryptography and hardware encryption modules, check:

https://www.malgregator.com/post/key-management/

Some predictions on future malware development (some of them confirmed by now):

https://www.malgregator.com/post/the-future-of-malware/the-f...

Or using modern smartcards like Yubikey with DevOps tools (Vault) by leveraging ancient technologies like pkcs11:

https://www.malgregator.com/post/vault-authentication-with-y...


How you ended up implement it in the code? Is it just a heuristic implemented as a series of if/else/case statements? Minimax? Thank you

EDIT: sorry, I found out that source code is available, I will try to find it

EDIT2: Looks like it's up for sale, not open


https://github.com/DigitalMars/Empire-for-PDP-10

It's the same algorithm. Mainly a bunch of ad-hoc heuristics.


I just want to say that ORCA author, Devine Lu Linvega[1], is such a talented and creative person. He build complete ecosystem with it's own language, drag & drop theme support[2] and human readable DB format[3]. He and his girlfriend (cartoonist) Rekka Bell are sailing the ocean and working from their sailboat Pino[4].

[1] https://wiki.xxiivv.com/

[2] https://github.com/hundredrabbits/Themes

[3] https://wiki.xxiivv.com/site/indental.html

[4] https://100r.co/site/about_us.html


Hi, thanks for sharing your website. You are doing interesting research.


hi thank you please fill in contact form and hop into the discord


Worth to mention that Brazil charged Intercept co-founder Glenn Greenwald with cybercrime charges similar to Assange. The guy who first met Snowden in HK with Laura Poitras.

Even if it looks like they have "postponed" prosecution for now.

https://theintercept.com/2020/02/06/glenn-greenwald-intercep...


This is really interesting project. I have closed the webpage at first, because I thought it is closed source, but then found your repository on a github.

I do not want to make some promo for other projects, but how you achieve trust with the signed list of fingerprints, is something similar I have read earlier there: https://tech.firstlook.media/keylist-rfc-explainer

Interesting prioject, will be watching it!


Curious that nobody mentioned https://standardnotes.org/

* already open-source

* client side encryption

* multi platform / multi device

* offline access, local backups


Shameless plug: For anybody interested in the cryptographic key management part there is a post about the hardware, people and processes behind the commercial cryptographic key management https://www.malgregator.com/key-management.html


do not use single node instance, in a HA fashion it is not a problem. Even with the open source version, which we are using.


I really do not understand your frustration. We are running 5 node cluster in production with the keepalived and nobody needs to wake up unsealing if one, or two instances fail. Perfectly good to do it in the morning by copy pasting curl oneliner from the keepass.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: