Blogs

BROWSE: Most Recent | Popular Tags |

Tags > ssl

Four short links: 8 August 2013

By Nat Torkington
August 8, 2013

Reducing the Roots of Some Evil (Etsy) — Based on our first two months of data we have removed a number of unused CA certificates from some pilot systems to test the effects, and will run CAWatch for a full …

Easily Invoke Common Protocols with Twisted

By Jessica McKellar
June 11, 2013

Twisted is a framework for writing, testing, and deploying event-driven clients and servers in Python. In my previous Twisted blog post, we explored an architectural overview of Twisted and examples of simple TCP, UDP, SSL, and HTTP echo servers. While …

Four short links: 2 May 2012

By Nat Torkington
May 2, 2012

Punting on SxSW (Brad Feld) -- I came across this old post and thought: if you can make money by being a dick, or make money by being a caring family person, why would you choose to be a dick? As far as I can tell, being a dick is optional. Brogrammers, take note. Be more like Brad Feld,...

Four short links: 25 November 2011

By Nat Torkington
November 25, 2011

Continuous Three-Dimensional Control of a Virtual Helicopter Using a Motor Imagery Based Brain-Computer Interface (PLOSone) -- direct brain control is becoming a reality, tiny step by tiny step. Also: HELICOPTERS! Forward Secrecy for HTTPS -- Google contributed a better HTTPS cipher suite to OpenSSL, one that doesn't share keys between conversations. Yay the Goog for giving back. Ratings Systems...

The Watering Hole - Speciality Counseling

The Watering Hole - Speciality Counseling
By James Turner
October 24, 2010

But little did any of them know that Eve was secretly listening in on the whole conversation...

TLS Report grades and reports on site security

By Jesse Robbins
June 10, 2008

My friend Ben Black just released TLS Report, a free (ad-supported) tool that evaluates SSL/TLS configurations across websites and assigns letter grades. In the example below, Facebook gets a D because it accepts several keys that are below 128-bits and relies on MD5: Ben explains: Cryptography is arcane and complex. Cryptography is also the basis for the various protocols that...


1 to 6 of 6
The Watering Hole