Hacker Newsnew | past | comments | ask | show | jobs | submit | Moral_'s submissionslogin
1.Patch Critical Cryptographic Vulnerability in Microsoft Windows [pdf] (defense.gov)
714 points by Moral_ on Jan 14, 2020 | past | 228 comments
2.What to do about duplicates in bug bounty programs? (plzdonthack.me)
1 point by Moral_ on March 31, 2018 | past
3.Android Security Ecosystem Investments Pay Dividends for Pixel (googleblog.com)
2 points by Moral_ on Jan 18, 2018 | past
4.Exploring Previously Unknown Remote Kernel Bugs Affecting Android Phones (pleasestopnamingvulnerabilities.com)
126 points by Moral_ on Nov 6, 2017 | past | 32 comments
5.How Evan McMullin Could Win Utah and the Presidency (fivethirtyeight.com)
3 points by Moral_ on Oct 17, 2016 | past
6.Bug 647959 – Add Honest Achmed's root certificate (2011) (bugzilla.mozilla.org)
111 points by Moral_ on Jan 4, 2016 | past | 68 comments
7.Compensate for Rockchip calendar deviation on November 31st (kernel.org)
131 points by Moral_ on Dec 20, 2015 | past | 37 comments
8.Court Docs Show Carnegie Mellon University Helped FBI Bust Silk Road 2 (vice.com)
8 points by Moral_ on Nov 11, 2015 | past
9.Hacking Team: A Zero-Day Market Case Study (tsyrklevich.net)
14 points by Moral_ on July 22, 2015 | past
10.Google Fiber Is Coming to Salt Lake City (googlefiberblog.blogspot.com)
204 points by Moral_ on March 24, 2015 | past | 102 comments
11.Quantum Experiment Shows How Time ‘Emerges’ from Entanglement (2013) (medium.com/the-physics-arxiv-blog)
1 point by Moral_ on Feb 10, 2015 | past
12. [dupe] CVE-2015-0235 glibc gethostbyname Overflow writeup (openwall.com)
13 points by Moral_ on Jan 27, 2015 | past | 1 comment
13.Home of the first website (cern.ch)
1 point by Moral_ on Jan 23, 2015 | past
14.Evil 32: Check Your GPG Fingerprints (evil32.com)
31 points by Moral_ on Nov 29, 2014 | past | 9 comments
15.Ask HN: Are you still using TrueCrypt? What alternatives are there?
2 points by Moral_ on Oct 31, 2014 | past | 2 comments
16.Green Lights Forever: Analyzing the Security of the Traffic Infrastructure [pdf] (jhalderm.com)
8 points by Moral_ on Aug 25, 2014 | past
17.Xfinity pineapple – Mimicking an xfinitywifi AP (logrhythm.com)
4 points by Moral_ on June 18, 2014 | past
18.OpenSSL vulnerable to timing attack? (seclists.org)
53 points by Moral_ on April 10, 2014 | past | 38 comments
19.Flappy 2048 (hczhcz.github.io)
2 points by Moral_ on April 10, 2014 | past
20.A Hypervisor that runs solely in L3 and encrypts ALL I/O (privatecore.com)
1 point by Moral_ on April 3, 2014 | past
21.We Are Morons: a quick look at the Win2k source (2004) (kuro5hin.org)
3 points by Moral_ on March 28, 2014 | past
22.Tracking users via wireless networking at BSides Vancouver (afreak.ca)
3 points by Moral_ on March 14, 2014 | past
23.Programming Images with all colors (codegolf.stackexchange.com)
7 points by Moral_ on Feb 28, 2014 | past
24.Does Your Learning Management System Marginalize Women? (medium.com/p)
3 points by Moral_ on Feb 5, 2014 | past | 3 comments
25.Reverse Engineering a Furby (poppopret.org)
103 points by Moral_ on Dec 18, 2013 | past | 26 comments
26.You Can't Do Binary Under Pressure (usvsth3m.com)
9 points by Moral_ on Oct 17, 2013 | past | 4 comments
27.Wi-Fi isn't radio? (kismetwireless.net)
15 points by Moral_ on Sept 12, 2013 | past
28.Perverting Embedded devices (infobytesec.com)
1 point by Moral_ on Aug 9, 2013 | past
29.Google Street View Comes Aboard Emirates’ Luxurious A380 (wired.com)
4 points by Moral_ on Aug 6, 2013 | past
30.Car Hacking Whitepaper and tools released (ioactive.com)
97 points by Moral_ on Aug 5, 2013 | past | 23 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: