Hacker Newsnew | past | comments | ask | show | jobs | submit | e-sushi's submissionslogin
1. [dupe] LineageOS (CyanogenMod official fork) (lineageos.org)
4 points by e-sushi on Dec 28, 2016 | past
2.Risk of appending secret salt to plaintext prior to RSA encryption? (crypto.stackexchange.com)
1 point by e-sushi on Dec 28, 2016 | past
3.Why call it a “major” revision if the suggested changes are seemingly minor? (academia.stackexchange.com)
1 point by e-sushi on Dec 27, 2016 | past
4.How long will it take for the amount of living to exceed the dead population? (worldbuilding.stackexchange.com)
2 points by e-sushi on Dec 27, 2016 | past
5.Is there a standard for OpenSSL-interoperable AES encryption? (crypto.stackexchange.com)
1 point by e-sushi on Dec 26, 2016 | past
6.Can I use PBKDF2 as a stream cipher? (crypto.stackexchange.com)
4 points by e-sushi on Dec 26, 2016 | past
7.Key Distribution vs. Key Management? (crypto.stackexchange.com)
3 points by e-sushi on Dec 26, 2016 | past
8.Is password-based AES encryption secure at all? (crypto.stackexchange.com)
2 points by e-sushi on Dec 26, 2016 | past
9.Is it possible to see animals from space? (space.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
10.Is every parallelogram a rectangle? (math.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
11.I want to become a living god (worldbuilding.stackexchange.com)
2 points by e-sushi on Dec 23, 2016 | past
12.Do Quantum Key Distribution and Physical Unclonable Functions Combine, and How? (crypto.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
13.Can we design a public-key infrastructure without certificate authorities? (crypto.stackexchange.com)
2 points by e-sushi on Dec 23, 2016 | past
14.What is a real-world metaphor for irrational numbers? (math.stackexchange.com)
2 points by e-sushi on Dec 23, 2016 | past
15.Office wants infinite branch merges as policy; what other options do we have? (softwareengineering.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
16.Snowman Bowling (codegolf.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
17.What happens to one in afterlife who doesn't believe in God? (hinduism.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
18.The female equivalent of “don't break my balls” (ell.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
19.Where can I find test vectors for ciphers? (crypto.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
20.What is the difference between CSPRNG and PRNG? (crypto.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
21.Schnorr protocol: how does malicious verifier win? (crypto.stackexchange.com)
1 point by e-sushi on Dec 23, 2016 | past
22.What is the difference between a 'cipher' and a 'mode of operation'? (crypto.stackexchange.com)
2 points by e-sushi on Dec 18, 2016 | past
23.How long will it take to crack passwords stolen as Yahoo announced 14-12-2016? (security.stackexchange.com)
2 points by e-sushi on Dec 16, 2016 | past
24.Where can I find NTRU test vectors? (crypto.stackexchange.com)
1 point by e-sushi on Dec 16, 2016 | past
25.Dice rolls as entropy source for cryptographic purposes? (crypto.stackexchange.com)
1 point by e-sushi on Dec 16, 2016 | past
26.How to visualize that ECB is a dangerous mode of ecryption (imgur.com)
2 points by e-sushi on Dec 15, 2016 | past
27.Elsevier production team messed up my paper. What should I do? (academia.stackexchange.com)
3 points by e-sushi on Dec 15, 2016 | past
28.How many digits of a Visa card number can vendors disclose on receipts? (security.stackexchange.com)
1 point by e-sushi on Dec 15, 2016 | past
29.Containerd – An open and reliable container runtime, by Docker (github.com/docker)
190 points by e-sushi on Dec 14, 2016 | past | 35 comments
30.How long would human immunity last in space? (worldbuilding.stackexchange.com)
1 point by e-sushi on Dec 14, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: