Reading List
- Dead Ends in Cryptanalysis #2: Timing Side-Channels
Previously on Dead Ends in Cryptanalysis, we talked about length-extension attacks and precisely why modern hash functions like SHA-3 and BLAKE2 aren’t susceptible. The art and science of sid…
- Dev Story: Unicode URL length limit blues
Adam Pritchard
I have enjoyed reading other people’s design and debugging train-of-thought posts, so after I spent two days wrestling with a code problem, I thought I’d write it up. It’s not technically exciting, but I think that describing it might be useful to someone – or my future self – someday. Or, at the very least, a little amusing.
- The humble hash aggregate
Data work has its own unique architecture we should be aware of.
- The top-ranking HTML editor on Google is an SEO scam
Caspar von Wrede
•
7 Jun 2021
A tale of online-sleuthing