EUNO.NEWS EUNO.NEWS
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
  • All (20931) +237
    • AI (3154) +13
    • DevOps (932) +6
    • Software (11018) +167
    • IT (5778) +50
    • Education (48)
  • Notice
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 1 day ago · software

    How to Set Up GPG Keys for an Existing GitHub Account (Step-by-Step)

    When working with Git and GitHub, you may notice a “Verified” badge on some commits. This badge means the commit was cryptographically signed, proving it truly...

    #git #github #gpg #commit-signing #security #cryptography
  • 6 days ago · software

    Enhancing Privacy with Stealth Addresses on Public Blockchains

    Blockchains are distributed ledgers that record every transaction occurring within the network, including the sender’s address, the receiver’s address, and the...

    #blockchain #privacy #stealth addresses #cryptography #pseudonymity #decentralized ledger
  • 1 week ago · software

    Metaclass Polymorphic Crypto: Enhanced Proof of Concept

    By Muhammed Shafin P January 2026 Related Article: A Metaclass Architecture for Encryption: Keys as Algorithm Generatorshttps://dev.to/hejhdiss/a-metaclass-arch...

    #encryption #metaclass #cryptography #proof-of-concept #BLAKE2b #SHA256 #DNA-driven parameters #variable-bit granularity
  • 1 week ago · software

    Enhanced Diffusion Through Key-Selected Hashing

    Parent Article: https://dev.to/hejhdiss/a-metaclass-architecture-for-encryption-keys-as-algorithm-generators-145o An Extension to the Metaclass Encryption Archi...

    #encryption #hashing #cryptography #BLAKE2 #SHA-256 #key-driven #diffusion #metaclass architecture
  • 2 weeks ago · software

    Decorative Cryptography

    Article URL: https://www.dlp.rip/decorative-cryptography Comments URL: https://news.ycombinator.com/item?id=46496494 Points: 24 Comments: 3...

    #cryptography #encryption #security #programming #software design
  • 2 weeks ago · software

    The PGP Problem (2019)

    Article URL: https://www.latacora.com/blog/2019/07/16/the-pgp-problem/ Comments URL: https://news.ycombinator.com/item?id=46486326 Points: 4 Comments: 49...

    #PGP #encryption #cryptography #email security #key management #open-source
  • 2 weeks ago · it

    The PGP problem (2019)

    Article URL: https://www.latacora.com/blog/2019/07/16/the-pgp-problem/ Comments URL: https://news.ycombinator.com/item?id=46486326 Points: 30 Comments: 63...

    #PGP #encryption #cryptography #email security #key management #cybersecurity
  • 2 weeks ago · software

    Building a Secure Password Manager

    Overview This project is a secure desktop password manager built using Python and Tkinter. It stores and manages credentials locally with strong encryption and...

    #python #password-manager #encryption #aes-256-gcm #tkinter #pbkdf2 #cryptography #security
  • 2 weeks ago · software

    Pixel-Powered Encryption: Turning an Image into a Key with Python

    !Image illustrating pixel‑powered encryptionhttps://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F...

    #python #encryption #cryptography #image-processing #steganography #pixel-key #security
  • 2 weeks ago · software

    Finite Fields - The Hidden Math Powering Blockchains

    Overview A few weeks ago, I promised a public build challenge: we’d explore blockchain from the ground up in Go, week by week, sharing insights, code, and the...

    #finite fields #blockchain #cryptography #go #elliptic curves
  • 2 weeks ago · software

    The JWT Algorithm 'none' Attack: The Vulnerability in 1 Line of Code

    JWT authentication is everywhere, but it’s also one of the most misconfigured security mechanisms. A single line of code can compromise everything. Attack demon...

    #JWT #authentication #security #vulnerability #CVE #none-algorithm #node.js #token #cryptography
  • 3 weeks ago · it

    Cleartext Signatures Considered Harmful

    Article URL: https://gnupg.org/blog/20251226-cleartext-signatures.html Comments URL: https://news.ycombinator.com/item?id=46403741 Points: 9 Comments: 1...

    #gnupg #cleartext signatures #digital signatures #cryptography #openpgp

Newer posts

Older posts
EUNO.NEWS
RSS GitHub © 2026