| | Trusting digital images to not be fake or altered (conorpp.com) |
|
1 point by conorpp on Feb 3, 2020 | past
|
| | A survey of open and secure microcontrollers (conorpp.com) |
|
2 points by conorpp on July 29, 2019 | past
|
| | Things you should definitely do when setting up a product line (conorpp.com) |
|
1 point by conorpp on July 29, 2019 | past
|
| | Designing Somu: tiny and open STM32 board (conorpp.com) |
|
1 point by ecesena on May 17, 2019 | past
|
| | Designing Somu, a tiny security key (conorpp.com) |
|
3 points by conorpp on May 16, 2019 | past
|
| | Designing Somu, a tiny security key (conorpp.com) |
|
4 points by ecesena on May 15, 2019 | past
|
| | 3D printing a programming jig and embedding pogo pins (conorpp.com) |
|
30 points by ecesena on Sept 23, 2018 | past | 18 comments
|
| | Designing Solo, a new U2F/FIDO2 Token (conorpp.com) |
|
144 points by ecesena on Aug 23, 2018 | past | 93 comments
|
| | Designing Solo, a New U2F/FIDO2 Token (conorpp.com) |
|
3 points by conorpp on Aug 23, 2018 | past
|
| | U2F Zero sales on Amazon year in review (conorpp.com) |
|
6 points by conorpp on Oct 8, 2017 | past
|
| | Randomly generating 3D mazes to 3D print (conorpp.com) |
|
3 points by mkeeter on July 2, 2017 | past
|
| | Designing and Producing 2FA tokens to Sell on Amazon (conorpp.com) |
|
255 points by conorpp on Sept 25, 2016 | past | 109 comments
|
| | Pearson Educations exploitable method for checking homework answers (conorpp.com) |
|
1 point by conorpp on May 29, 2016 | past
|
| | My experience with DirtyPCBS.com (conorpp.com) |
|
1 point by conorpp on March 13, 2016 | past
|
| | Keyak: a candidate for the authenticated encryption standard (conorpp.com) |
|
3 points by conorpp on Feb 20, 2016 | past
|
| | Security and usage of Braintree, a PayPal backed payment gateway API (conorpp.com) |
|
1 point by conorpp on Jan 10, 2016 | past
|
| | How to accelerate a program using hardware (conorpp.com) |
|
36 points by conorpp on Dec 17, 2015 | past | 9 comments
|
| | Linx: the filesharing server every hacker should know about (conorpp.com) |
|
12 points by conorpp on Nov 9, 2015 | past
|
| | Trying out Let's Encrypt (beta) (conorpp.com) |
|
104 points by conorpp on Nov 5, 2015 | past | 51 comments
|
| | A close look at an operating botnet (conorpp.com) |
|
50 points by conorpp on Oct 11, 2015 | past | 4 comments
|
| | How to Fix a Corrupted File by Brute Force (conorpp.com) |
|
1 point by conorpp on Sept 28, 2015 | past
|
| | Proxying Bluetooth devices for security analysis using btproxy (conorpp.com) |
|
3 points by conorpp on Sept 7, 2015 | past
|
| | How to support PGP encryption in Gmail (conorpp.com) |
|
113 points by conorpp on Aug 26, 2015 | past | 49 comments
|
| | How I grew up in Maine and ended up here (in progress) (conorpp.com) |
|
1 point by conorpp on July 30, 2014 | past
|