Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.

The Chinese can pump or dump the Trump family's net worth by billions any time they want to.
The response will be predictably Pavlovian.
universeodon.com/@cryptadamist

@benb@osintua.eu
2025-10-27 16:29:34

EU targets Russian crypto payments in 19th sanctions package, hitting Grinex and A7A5: benborges.xyz/2025/10/27/eu-ta

@dawid@social.craftknight.com
2025-11-26 14:24:45
Rozszerzam pamięć steamdecka do 2TB - w końcu będę mieć miejsce na emulatory 😊

Było to łatwiejsze niż myślałem.

Tak, pamiętałem, żeby wyciągnąć karte SD 😁

#steamdeck #ifixit
@UP8@mastodon.social
2025-12-28 01:44:09

⏱️ Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level
blog.trailofbits.com/2025/11/2

@Mediagazer@mstdn.social
2025-11-27 14:15:54

A BBC article and a BBC radio presenter say they won't quote Rutger Bregman calling Trump openly corrupt during the Reith Lecture, a line the BBC had removed (Michael Savage/The Guardian)
theguardian.com/media/2025/nov

@stf@chaos.social
2025-11-26 17:06:26

by accident i stumbled on this review by the #NSA on Bruce Schneiers "Applied Crypto" book from long ago.

9. BOOK REVIEW: APPLIED CRYPTOGRAPHY [censored] Reviewer

Applied Cryptography, for those who don't read the internet news, is a
book written by Bruce Schneier last year. According to the jacket,
Schneier is a data security expert with a master's degree in computer
science. According to his followers, he is a hero who has finally
brought together the loose threads of cryptography for the general
public to understand. Schneier has gathered academic research, internet
gossip, and everything he co…
Issue 1 TALES OF THE KRYPT Page 14 of 16
oc ID: 6823780

Playing loose with the facts is a serious problem with Schneier. For
example in discussing a small-exponent attack on RSA, he says "an
attack by Michael Wiener will recover e when e is up to one quarter the
size of n." Actually, Wiener's attack recovers the secret exponent d
when e has less than one quarter as many bits as n, which is a quite
different statement. Or: "The quadratic sieve is the fastest known .
algorithm for factoring numb…
@publicvoit@graz.social
2025-09-28 09:52:40

@… from Johns Hopkins University on #Microsoft #ActiveDirectory:

@servelan@newsie.social
2025-10-26 17:27:57

YouTuber Mr Crafty Pants arrested for alleged possession of sexual images of children | The Independent
the-independent.com/news/world

@fanf@mendeddrum.org
2025-11-26 12:42:03

from my link log —
Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level.
blog.trailofbits.com/2025/11/2

@Techmeme@techhub.social
2025-11-27 06:26:01

South Korean crypto exchange Upbit suspended deposits and withdrawals after saying $37M worth of Solana tokens were moved to an unauthorized external wallet (Sidhartha Shukla/Bloomberg)
bloomberg.com/news/articles/20