1. d4¹

@1dotd4

{crypto, infosec, hacking, ...} = math×people ♟ ¹this is how I like to open, your turn.

p/q2-q4!
Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @1dotd4

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @1dotd4

  1. proslijedio/la je Tweet

    Scientifically, it's surprising to see the lack of citation to time-lock puzzles and verifiable delay functions, which (1) similarly hope that latency limits can stop a massively parallel attacker from outperforming the verifier, and (2) choose harder-to-parallelize computations.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 22 sata

    NSAがエニグマのシミュレーター公開してる!

    Prikaži ovu nit
    Poništi
  3. prije 20 sati
    Poništi
  4. proslijedio/la je Tweet
    2. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Good news — since China stole the IP of F-35 for their J-31 it means their software is crap too. NSA can just patch diff between the current builds and the stolen builds and they’ll have hundreds of 1day exploits! China’s industrial espionage is a vulnerability!! 😋

    Tweet je nedostupan.
    Poništi
  6. proslijedio/la je Tweet
    31. sij
    Poništi
  7. proslijedio/la je Tweet

    Fun Fact #1: “Top Secret/SCI” refers to information so highly classified that it may be discussed only in a Sensitive Compartmented Information Facility (SCIF). FF#2: Bringing cell phones, cameras, or even thumb drives into a SCIF is forbidden. Tweeted tonight by POTUS:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. sij
    Odgovor korisniku/ci
    Poništi
  9. proslijedio/la je Tweet

    Arnaldo is a student in my applied dynamical systems graduate course – and this was part of his homework assignment! He thought posting it on Twitter would be the easiest way to submit it. Great stuff! Enjoy this thread about “homoclinic tangles” (as discovered by Poincare).

    Poništi
  10. proslijedio/la je Tweet
    30. sij
    Poništi
  11. proslijedio/la je Tweet
    29. sij

    There is a key escrow concept to unlock stuff like iPhones that I would support in a utopian society exempted from human flaws and facing a threat from outside. We do not live in that society, we are each of us human, and the most threatening peer state to America is itself.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. sij
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    It was just Friday that we asked for 7,777 free software activists to stand with us in calling on to . With your inspiring help we've smashed through that goal. Sign today and stay tuned for updates on the campaign!

    Poništi
  14. proslijedio/la je Tweet
    29. sij

    A simple and effective IT security policy can fit in a tweet. What’s your excuse now?

    Poništi
  15. proslijedio/la je Tweet
    28. sij
    Poništi
  16. proslijedio/la je Tweet
    Odgovor korisniku/ci

    I have a Twitter bot, that tweets primes I factored from RSA certs I got from using batch gcd. Don’t have a favorite, but I’m sure there are some good ones.

    Poništi
  17. 28. sij

    more offline hax

    Poništi
  18. proslijedio/la je Tweet
    27. sij
    Poništi
  19. 27. sij
    Poništi
  20. proslijedio/la je Tweet
    23. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·