<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/u/jaw/sec</id>
  <updated>2023-03-19T10:12:06-04:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>Home · Wiki · Kali Linux / kali-purple / Documentation · GitLab</title>
    <link rel="alternate" href="https://gitlab.com/kalilinux/kali-purple/documentation/-/wikis/home"/>
    <id>0983a5ccc228b618a3ce3de43f80b414</id>
    <published>2023-03-19T10:12:06-04:00</published>
    <updated>2023-03-19T10:12:06-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Home · Wiki · Kali Linux / kali-purple / Documentation · GitLab</summary>
    <content type="html">A movement to make enterprise grade security accessible to everyone.</content>
  </entry>
  <entry>
    <title>Cookie stealing: the new perimeter bypass – Sophos News</title>
    <link rel="alternate" href="https://news.sophos.com/en-us/2022/08/18/cookie-stealing-the-new-perimeter-bypass/"/>
    <id>49519d02fe0aeae6802bb032280368c0</id>
    <published>2022-10-05T15:50:11-04:00</published>
    <updated>2022-10-05T15:50:11-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Cookie stealing: the new perimeter bypass – Sophos News</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Why Doesn’t Your CI Pipeline Have Security Bug Testing?</title>
    <link rel="alternate" href="https://www.stackhawk.com/blog/ci-pipeline-security-bug-testing/"/>
    <id>3b454fbfb4a14d3b31df45ca200dedc4</id>
    <published>2022-04-10T23:02:07-04:00</published>
    <updated>2022-04-10T23:02:07-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Why Doesn’t Your CI Pipeline Have Security Bug Testing?</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>lix2ng/qdsv: Full qDSA on all Cortex-M cores. M0, M3, M4 etc.</title>
    <link rel="alternate" href="https://github.com/lix2ng/qdsv"/>
    <id>8c29c36df2406852b924ac7caee3bfbd</id>
    <published>2021-04-02T12:50:24-04:00</published>
    <updated>2021-04-02T12:50:24-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">lix2ng/qdsv: Full qDSA on all Cortex-M cores. M0, M3, M4 etc.</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Software · Joost Renes</title>
    <link rel="alternate" href="https://joostrenes.nl/software/"/>
    <id>c6827b1c94fed9c09e23130f927028eb</id>
    <published>2021-04-02T12:41:58-04:00</published>
    <updated>2021-04-02T12:41:58-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Software · Joost Renes</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Curve9767 and Fast Signature Verification – NCC Group Research</title>
    <link rel="alternate" href="https://research.nccgroup.com/2020/04/28/curve9767-and-fast-signature-verification/"/>
    <id>64948ab45961f1b4d46b0815e0deb401</id>
    <published>2021-04-02T12:07:48-04:00</published>
    <updated>2021-04-02T12:07:48-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Curve9767 and Fast Signature Verification – NCC Group Research</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>mupq/pqm4: Post-quantum crypto library for the ARM Cortex-M4</title>
    <link rel="alternate" href="https://github.com/mupq/pqm4"/>
    <id>b92a37f98f0f99d0cf4b07bf8f3dfa07</id>
    <published>2021-04-01T14:31:13-04:00</published>
    <updated>2021-04-01T14:31:13-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">mupq/pqm4: Post-quantum crypto library for the ARM Cortex-M4</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Sick of spending time on Auth, we built an open source 'Stripe for Auth' | Hacker News</title>
    <link rel="alternate" href="https://news.ycombinator.com/item?id=25458033"/>
    <id>3d62ba17ce244d10905d9af8e46f3e45</id>
    <published>2020-12-18T11:15:11-05:00</published>
    <updated>2020-12-18T11:15:11-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Sick of spending time on Auth, we built an open source 'Stripe for Auth' | Hacker News</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Google Online Security Blog: New research: How effective is basic account hygiene at preventing hijacking</title>
    <link rel="alternate" href="https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html"/>
    <id>71fe67fa16ca148ddcb469dbfbcb4904</id>
    <published>2019-05-21T08:58:47-04:00</published>
    <updated>2019-05-21T08:58:47-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Google Online Security Blog: New research: How effective is basic account hygiene at preventing hijacking</summary>
    <content type="html">Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation.</content>
  </entry>
  <entry>
    <title>ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking</title>
    <link rel="alternate" href="http://www.inspire.edu.gr/artemis/"/>
    <id>a7f7cafe34d987c7971b4d5df06cd68b</id>
    <published>2019-02-08T15:38:27-05:00</published>
    <updated>2019-02-08T15:38:27-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering</title>
    <link rel="alternate" href="https://blog.cryptographyengineering.com/2018/10/19/lets-talk-about-pake/"/>
    <id>0acc3f535fddcf9d36ff2ea6a3ebd9a3</id>
    <published>2018-10-19T23:59:17-04:00</published>
    <updated>2018-10-19T23:59:17-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering</summary>
    <content type="html">A PAKE protocol, first introduced by Bellovin and Merritt, is a special form of cryptographic key exchange protocol. Key exchange (or “key agreement”) protocols are designed to help two parties (call them a client and server) agree on a shared key, using public-key cryptography.</content>
  </entry>
  <entry>
    <title>Librem Key – Purism</title>
    <link rel="alternate" href="https://puri.sm/products/librem-key/"/>
    <id>1aee3752e8cccfbe5bb1fc7659be2c21</id>
    <published>2018-09-23T09:46:57-04:00</published>
    <updated>2018-09-23T09:46:57-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Librem Key – Purism</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>SC4 HSM</title>
    <link rel="alternate" href="https://sc4.us/hsm/"/>
    <id>ce355d6cac1b9e388253a46856d36c6d</id>
    <published>2018-09-12T21:38:02-04:00</published>
    <updated>2018-09-12T21:38:02-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">SC4 HSM</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Krypton | Easy and secure web logins</title>
    <link rel="alternate" href="https://krypt.co/?ref=u2f"/>
    <id>43745d5ee24967490590e46042f7e2ec</id>
    <published>2018-08-30T14:00:38-04:00</published>
    <updated>2018-08-30T14:00:38-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Krypton | Easy and secure web logins</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Titan Security Key Bundle, BT &amp; NFC FIDO U2F - Google Store</title>
    <link rel="alternate" href="https://store.google.com/us/product/titan_security_key_kit?hl=en-US"/>
    <id>ef9beae845c3edbcdc344cb1eaac51ac</id>
    <published>2018-08-30T13:59:46-04:00</published>
    <updated>2018-08-30T13:59:46-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Titan Security Key Bundle, BT &amp; NFC FIDO U2F - Google Store</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>How To Turn Loaded Dice into Fair Coins</title>
    <link rel="alternate" href="http://markus-jakobsson.com/papers/jakobsson-ieeeit00.pdf"/>
    <id>9098f29cb6e647ce850865941e8f1888</id>
    <published>2018-08-23T13:22:51-04:00</published>
    <updated>2018-08-23T13:22:51-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">How To Turn Loaded Dice into Fair Coins</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>U2F Zero</title>
    <link rel="alternate" href="https://u2fzero.com/"/>
    <id>b95347c885a381fbff6c2e95bc20bce5</id>
    <published>2017-12-06T18:42:13-05:00</published>
    <updated>2017-12-06T18:42:13-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">U2F Zero</summary>
    <content type="html">A secure and open source 2 factor authentication token.
Designed to be affordable and reliable</content>
  </entry>
  <entry>
    <title>Multicollisions in iterated hash functions. Applications to cascaded constructions.</title>
    <link rel="alternate" href="https://www.iacr.org/archive/crypto2004/31520306/multicollisions.pdf"/>
    <id>01b5066bb7c94a95dfb862757d47b729</id>
    <published>2017-04-26T14:09:32-04:00</published>
    <updated>2017-04-26T14:09:32-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Multicollisions in iterated hash functions. Applications to cascaded constructions.</summary>
    <content type="html">Is the concatenation of two independent hash values more secure than a single hash-value?
tl;dr: this construction is in fact insecure</content>
  </entry>
  <entry>
    <title>NIST’s new password rules – what you need to know – Naked Security</title>
    <link rel="alternate" href="https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/"/>
    <id>2df6c6c1f0867473fea64df8958681aa</id>
    <published>2017-03-10T09:19:35-05:00</published>
    <updated>2017-03-10T09:19:35-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">NIST’s new password rules – what you need to know – Naked Security</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>What every Browser knows about you</title>
    <link rel="alternate" href="http://webkay.robinlinus.com/"/>
    <id>5c6946ac849a67224d96d9bacb55190e</id>
    <published>2016-12-21T09:15:16-05:00</published>
    <updated>2016-12-21T09:15:16-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">What every Browser knows about you</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>The Security of Modern Password Expiration</title>
    <link rel="alternate" href="https://www.cs.unc.edu/~reiter/papers/2010/CCS.pdf"/>
    <id>13d1a192cb01b1d89647a1295a5f66d0</id>
    <published>2016-08-04T09:15:21-04:00</published>
    <updated>2016-08-04T09:15:21-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">The Security of Modern Password Expiration</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>the historical success of collision attacks does not imply a danger of pre-image attacks</title>
    <link rel="alternate" href="https://tahoe-lafs.org/~zooko/preimage-attacks-color.html"/>
    <id>037040ff24776c798dbf3ac86fcdcb41</id>
    <published>2016-02-14T11:50:02-05:00</published>
    <updated>2016-02-14T11:50:02-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">the historical success of collision attacks does not imply a danger of pre-image attacks</summary>
    <content type="html">The main result of this investigation is that “the historical success of collision attacks does not imply a danger of pre-image attacks”.

</content>
  </entry>
  <entry>
    <title>crypt-dev - entropy loss with narrow-pipe iterated hashes</title>
    <link rel="alternate" href="http://www.openwall.com/lists/crypt-dev/2011/07/14/1"/>
    <id>09a966ed77f1ba4aebd70532afdb846f</id>
    <published>2016-01-22T15:20:21-05:00</published>
    <updated>2016-01-22T15:20:21-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">crypt-dev - entropy loss with narrow-pipe iterated hashes</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista</title>
    <link rel="alternate" href="http://css.csail.mit.edu/6.858/2013/readings/bitlocker.pdf"/>
    <id>fe76f09a442e170c4beac28b9d48053f</id>
    <published>2016-01-10T00:07:26-05:00</published>
    <updated>2016-01-10T00:07:26-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>The Analysis of the Windows Vista Disk Encryption Algorithm</title>
    <link rel="alternate" href="http://dl.ifip.org/db/conf/dbsec/dbsec2008/El-FotouhD08.pdf"/>
    <id>46ba914308bb54b5b830506380b8b80d</id>
    <published>2015-12-20T16:55:32-05:00</published>
    <updated>2015-12-20T16:55:32-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">The Analysis of the Windows Vista Disk Encryption Algorithm</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Detectify Labs</title>
    <link rel="alternate" href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy"/>
    <id>6686456913b7bdcdad7c36961f5fd917</id>
    <published>2015-11-21T11:06:38-05:00</published>
    <updated>2015-11-21T11:06:38-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Detectify Labs</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>An Open Letter to Developers Everywhere (About Cryptography)</title>
    <link rel="alternate" href="https://gist.github.com/paragonie-scott/e9319254c8ecbad4f227"/>
    <id>b0477998503d7a21bc916cf03dbd2fc6</id>
    <published>2015-11-19T14:34:19-05:00</published>
    <updated>2015-11-19T14:34:19-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">An Open Letter to Developers Everywhere (About Cryptography)</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>awslabs/s2n</title>
    <link rel="alternate" href="https://github.com/awslabs/s2n"/>
    <id>6e5f4673af0181fcd57ec209e624445f</id>
    <published>2015-06-30T12:42:39-04:00</published>
    <updated>2015-06-30T12:42:39-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">awslabs/s2n</summary>
    <content type="html">s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</content>
  </entry>
  <entry>
    <title>KeySweeper</title>
    <link rel="alternate" href="http://samy.pl/keysweeper/"/>
    <id>983beec34b28395e857b677cfb4fbf16</id>
    <published>2015-01-13T09:23:06-05:00</published>
    <updated>2015-01-13T09:23:06-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">KeySweeper</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Secure Secure Shell</title>
    <link rel="alternate" href="https://stribika.github.io/2015/01/04/secure-secure-shell.html"/>
    <id>5c1e135ad70e56a9123c269b146e53eb</id>
    <published>2015-01-08T09:15:43-05:00</published>
    <updated>2015-01-08T09:15:43-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Secure Secure Shell</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>How To Safely Store A Password | codahale.com</title>
    <link rel="alternate" href="http://codahale.com/how-to-safely-store-a-password/"/>
    <id>c2448e9e06afaadbf96ef3d3cddf265a</id>
    <published>2014-09-19T12:35:36-04:00</published>
    <updated>2014-09-19T12:35:36-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">How To Safely Store A Password | codahale.com</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Stop using unsafe keyed hashes, use HMAC | root labs rdist</title>
    <link rel="alternate" href="http://rdist.root.org/2009/10/29/stop-using-unsafe-keyed-hashes-use-hmac/"/>
    <id>5f7c020c02319b5ab4d23d8603ba9a7e</id>
    <published>2014-09-19T12:03:29-04:00</published>
    <updated>2014-09-19T12:03:29-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Stop using unsafe keyed hashes, use HMAC | root labs rdist</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Two-Factor Authentication Made Easy - Duo Security</title>
    <link rel="alternate" href="https://www.duosecurity.com/"/>
    <id>070bb226a9c0f2001bc8b9068166844e</id>
    <published>2014-06-04T22:02:42-04:00</published>
    <updated>2014-06-04T22:02:42-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Two-Factor Authentication Made Easy - Duo Security</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>IOS Security</title>
    <link rel="alternate" href="http://images.apple.com/iphone/business/docs/iOS_Security_Feb14.pdf"/>
    <id>cae60935c430ab7700995d5f6a90b726</id>
    <published>2014-03-04T09:20:26-05:00</published>
    <updated>2014-03-04T09:20:26-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">IOS Security</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Security Engineering - A Guide to Building Dependable Distributed Systems</title>
    <link rel="alternate" href="https://www.cl.cam.ac.uk/~rja14/book.html"/>
    <id>6a48c5f427889d59487e7b17bc433096</id>
    <published>2014-02-27T12:50:46-05:00</published>
    <updated>2014-02-27T12:50:46-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Security Engineering - A Guide to Building Dependable Distributed Systems</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>SRP: Design Specifications</title>
    <link rel="alternate" href="http://srp.stanford.edu/design.html"/>
    <id>f64c525f0fdd4c381e56bfdd99694586</id>
    <published>2014-02-12T00:43:03-05:00</published>
    <updated>2014-02-12T00:43:03-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">SRP: Design Specifications</summary>
    <content type="html">SRP is the newest addition to a new class of strong authentication protocols that resist all the well-known passive and active attacks over the network. SRP borrows some elements from other key-exchange and identification protcols and adds some subtle modifications and refinements. The result is a protocol that preserves the strength and efficiency of the EKE family protocols while fixing some of their shortcomings.
</content>
  </entry>
  <entry>
    <title>Open WhisperSystems &gt;&gt; Open WhisperSystems</title>
    <link rel="alternate" href="https://whispersystems.org/"/>
    <id>9b5ee1f545d42b2142cbb00e011bfd98</id>
    <published>2014-01-26T22:38:02-05:00</published>
    <updated>2014-01-26T22:38:02-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Open WhisperSystems &gt;&gt; Open WhisperSystems</summary>
    <content type="html">RedPhone provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.</content>
  </entry>
  <entry>
    <title>CCC-TV - 30C3 (1/4)</title>
    <link rel="alternate" href="http://media.ccc.de/browse/congress/2013/"/>
    <id>9bd703ca13541106e7e7d6f80cca829b</id>
    <published>2014-01-26T22:36:46-05:00</published>
    <updated>2014-01-26T22:36:46-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">CCC-TV - 30C3 (1/4)</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Ori File System</title>
    <link rel="alternate" href="http://ori.scs.stanford.edu/"/>
    <id>e7ffd6544119a8c429c530da519d89a3</id>
    <published>2014-01-25T16:34:20-05:00</published>
    <updated>2014-01-25T16:34:20-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Ori File System</summary>
    <content type="html">Ori is a distributed file system built for offline operation and empowers the user with control over synchronization operations and conflict resolution. We provide history through light weight snapshots and allow users to verify the history has not been tampered with. Through the use of replication instances can be resilient and recover damaged data from other nodes.
</content>
  </entry>
  <entry>
    <title>On Covert Acoustical Mesh Networks in Air - Volume 8, No. 11, November 2013 - Journal of Communications</title>
    <link rel="alternate" href="http://www.jocm.us/index.php?m=content&amp;c=index&amp;a=show&amp;catid=124&amp;id=600"/>
    <id>eb412697121126d1e3bbff84fb65fb87</id>
    <published>2013-11-26T09:20:01-05:00</published>
    <updated>2013-11-26T09:20:01-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">On Covert Acoustical Mesh Networks in Air - Volume 8, No. 11, November 2013 - Journal of Communications</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Authy</title>
    <link rel="alternate" href="https://www.authy.com/"/>
    <id>de3d9223f55b8eb216fbb9fd12916769</id>
    <published>2013-11-22T15:36:54-05:00</published>
    <updated>2013-11-22T15:36:54-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Authy</summary>
    <content type="html">Authy is the first strong authentication platform built for large-scale applications and built with the end-user in mind. 
With Authy you get all the benefits of strong authentication with the simplicity that you've always wanted for your customers.</content>
  </entry>
  <entry>
    <title>Analysis of the HTTPS Certificate Ecosystem∗</title>
    <link rel="alternate" href="http://conferences.sigcomm.org/imc/2013/papers/imc257-durumericAemb.pdf"/>
    <id>4bc66e96b4e64da047d9afef4c361eb5</id>
    <published>2013-11-16T10:29:29-05:00</published>
    <updated>2013-11-16T10:29:29-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Analysis of the HTTPS Certificate Ecosystem∗</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Secure Mobile Apps and Open-Source Code for a Better Tomorrow</title>
    <link rel="alternate" href="https://guardianproject.info/code/"/>
    <id>1d94a53572bad11dde1c387b4dc9046a</id>
    <published>2013-09-05T09:14:55-04:00</published>
    <updated>2013-09-05T09:14:55-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Secure Mobile Apps and Open-Source Code for a Better Tomorrow</summary>
    <content type="html">The Guardian Project is about more than just apps. All of our code is open-source in order to move the collective ball forward in mobile security efforts. In addition we are building developer-focused libraries, tools and source code for you to add security-oriented features and capabilities to your own apps.</content>
  </entry>
  <entry>
    <title>ZMap · The Internet Scanner</title>
    <link rel="alternate" href="https://zmap.io/"/>
    <id>61893c49b0dd976d36d2147cbd637909</id>
    <published>2013-08-20T09:13:53-04:00</published>
    <updated>2013-08-20T09:13:53-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">ZMap · The Internet Scanner</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Know your Enemy: Tracking Botnets</title>
    <link rel="alternate" href="http://www.honeynet.org/book/export/html/50"/>
    <id>850176ece69a99e5cc006745d392edee</id>
    <published>2013-08-14T17:18:21-04:00</published>
    <updated>2013-08-14T17:18:21-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Know your Enemy: Tracking Botnets</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Tarnovsky Deconstruct Processor - YouTube</title>
    <link rel="alternate" href="http://www.youtube.com/watch?v=w7PT0nrK2BE&amp;feature=player_embedded#!"/>
    <id>140d6201371116400c5b784953af0485</id>
    <published>2013-03-05T15:08:50-05:00</published>
    <updated>2013-03-05T15:08:50-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Tarnovsky Deconstruct Processor - YouTube</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>FST-01 - Wiki</title>
    <link rel="alternate" href="http://www.seeedstudio.com/wiki/FST-01"/>
    <id>8d58c1a205b3e5818255d54dc921d601</id>
    <published>2013-02-25T20:51:30-05:00</published>
    <updated>2013-02-25T20:51:30-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">FST-01 - Wiki</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>GnuK</title>
    <link rel="alternate" href="http://www.fsij.org/gnuk/"/>
    <id>99835c4624d24a3c4e0821dc397891a4</id>
    <published>2013-02-25T20:44:38-05:00</published>
    <updated>2013-02-25T20:44:38-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">GnuK</summary>
    <content type="html">Gnuk is an implementation of USB cryptographic token for GNU Privacy Guard. Gnuk supports OpenPGP card protocol version 2, and it runs on STM32F103 processor.
</content>
  </entry>
  <entry>
    <title>Easier to Get Infected With Malware on 'Good Sites' Than on Shady Sites, Cisco Says | SecurityWeek.Com</title>
    <link rel="alternate" href="http://www.securityweek.com/easier-get-infected-malware-good-sites-shady-sites-cisco-says"/>
    <id>086be6fe92828a0f728a7723904e94e9</id>
    <published>2013-02-01T09:18:41-05:00</published>
    <updated>2013-02-01T09:18:41-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Easier to Get Infected With Malware on 'Good Sites' Than on Shady Sites, Cisco Says | SecurityWeek.Com</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>dns-fuzz NSE Script</title>
    <link rel="alternate" href="http://nmap.org/nsedoc/scripts/dns-fuzz.html"/>
    <id>379dd7681c84058ab7356eccf132d4e4</id>
    <published>2013-01-19T10:47:32-05:00</published>
    <updated>2013-01-19T10:47:32-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">dns-fuzz NSE Script</summary>
    <content type="html"></content>
  </entry>
</feed>
