1. | | Web Almanac 2020: the annual state of the web report (httparchive.org) |
|
4 points by tomvangoethem on Dec 9, 2020 | past
|
2. | | Dragonblood – several design flaws discovered in WPA3 (mathyvanhoef.com) |
|
9 points by tomvangoethem on April 10, 2019 | past
|
3. | | Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation (tranco-list.eu) |
|
1 point by tomvangoethem on Feb 25, 2019 | past
|
4. | | Revealing Private Information Through Browser-Based Timing Attacks (tom.vg) |
|
3 points by tomvangoethem on Oct 12, 2016 | past
|
5. | | Request and Conquer (tom.vg) |
|
1 point by tomvangoethem on Aug 22, 2016 | past
|
6. | | Timing Attacks in the Modern Web (tom.vg) |
|
7 points by tomvangoethem on Aug 1, 2016 | past | 1 comment
|
7. | | CloudPiercer: Is your cloud-protected website's origin exposed? (cloudpiercer.org) |
|
14 points by tomvangoethem on Oct 5, 2015 | past | 2 comments
|
8. | | CloudPiercer: Is your cloud-protected website's origin exposed? (cloudpiercer.org) |
|
2 points by tomvangoethem on Oct 5, 2015 | past
|
9. | | Android 5.x Lockscreen Bypass (utexas.edu) |
|
1 point by tomvangoethem on Sept 15, 2015 | past
|
10. | | Practical attack against TLS/SSL and RC4 (rc4nomore.com) |
|
111 points by tomvangoethem on July 15, 2015 | past | 42 comments
|
11. | | Combining the power of R and D3.js (blog.ae.be) |
|
82 points by tomvangoethem on March 6, 2015 | past | 15 comments
|
12. | | Clubbing (Third-party Security) Seals (vagosec.org) |
|
6 points by tomvangoethem on Nov 24, 2014 | past | 2 comments
|
13. | | Attacking the Internet using Broadcast Digital Television (ne.ro) |
|
3 points by tomvangoethem on June 8, 2014 | past
|
14. | | IamA Hacker who was Raided by the FBI and Secret Service AMAA (reddit.com) |
|
2 points by tomvangoethem on April 10, 2014 | past
|
15. | | Wilcard DNS, Content Poisoning, XSS and Certificate Pinning (w00tsec.blogspot.be) |
|
3 points by tomvangoethem on March 31, 2014 | past
|
16. | | Virtual Reality with HTML5: demo (try on mobile) (opera.com) |
|
2 points by tomvangoethem on March 26, 2014 | past
|
17. | | PBKDF2+HMAC hash collisions explained (mathiasbynens.be) |
|
4 points by tomvangoethem on March 25, 2014 | past | 1 comment
|
18. | | Developer runs program that automatically tweets anything he copies (twitter.com/driesdepoorter) |
|
2 points by tomvangoethem on March 25, 2014 | past
|
19. | | Prezi Got Pwned: A Tale of Responsible Disclosure (prezi.com) |
|
14 points by tomvangoethem on March 24, 2014 | past
|
20. | | Why I removed my sensitive files from Google Drive (vagosec.org) |
|
11 points by tomvangoethem on Feb 18, 2014 | past | 2 comments
|
21. | | Remote Code Execution exploit in WordPress 3.5.1 (vagosec.org) |
|
3 points by tomvangoethem on Dec 9, 2013 | past
|
22. | | WordPress before 3.6.1: PHP Object Injection (vagosec.org) |
|
5 points by tomvangoethem on Sept 11, 2013 | past | 2 comments
|
23. | | Why you should not trust emails sent from Google (vagosec.org) |
|
353 points by tomvangoethem on Sept 11, 2013 | past | 94 comments
|