Tagged “networking”
- Overloaded fields, type safety, and you
- Notes on Post-Quantum Cryptography for TLS 1.2
- How to manage a quantum computing emergency
- Design choices for post-quantum TLS
- Maybe someday we'll actually be able to search the Web privately
- Private Access Tokens, also not great
- The endpoint of Web Environment Integrity is a closed Web
- How NATs Work, Part IV: TURN Relaying
- How NATs Work, Part III: ICE
- How NATs Work, Part II: NAT types and STUN
- Everything you never knew about NATs and wish you hadn't asked
- Network-based Web blocking techniques (and evading them)
- Internet Transport Protocols, Part I: Reliable Transports
- First impressions of Bluesky's AT Protocol
- How to hide your IP address
- Self-Driving Vehicles, Monoculture, and You
- On the Security and Privacy Properties of Public WiFi
- ELI15: Private Information Retrieval
- Can we make Safe Browsing safer?
- An overview of browser privacy features
- First impressions of Web5
- Notes on Multiple Encryption and Content Filtering
- End-to-End Encryption and the EU's new proposed CSAM Regulation
- Challenges in Building a Decentralized Web
- Privately Measuring Vaccine Doses
- A look at the Dutch vaccine passport system
- Privacy Preserving Vaccine Credentials
- A quick look at the New Zealand Vaccine Pass
- The EU vaccine passport compromise and how to (maybe) fix it
- Do you know what your computer is running?
- Perceptual versus cryptographic hashes for CSAM scanning
- What does the NeuralHash collision mean? Not much
- More on Apple's Client-side CSAM Scanning
- Overview of Apple's Client-side CSAM Scanning
- Securing Cryptographic Protocols Against Quantum Computers
- A look at the EU vaccine passport
- What's in California's Vaccine Passport?
- Some Confusion in New York's Vaccine Passport Rollout
- The tech behind EG
- Blockchains/Ledgers and Vaccine Passports
- Authentication for Vaccine Passports
See all tags.