All Blog Posts Dhole Moments, Soa Talks, and Other Bad Puns… Twitter’s Birdwatch is Fundamentally Flawed by Soatok January 27, 2021January 27, 2021 No, You’re Not a “Sigma Male” by Soatok January 25, 2021January 26, 2021 Please Stop Encrypting with RSA Directly by Soatok January 20, 2021January 21, 2021 Welcome to the Furry Fandom by Soatok January 14, 2021January 14, 2021 Block Cipher Structures: Ranked by Soatok January 11, 2021January 11, 2021 Masks Off for TheDonald.win by Soatok January 9, 2021January 22, 2021 The Story So Fur by Soatok December 24, 2020December 24, 2020 Cryptographic Wear-Out for Symmetric Encryption by Soatok December 24, 2020December 24, 2020 Putting Scammers on Scan on Twitter by Soatok December 11, 2020December 15, 2020 Opinionated Guides by Vega Deftwing by Soatok December 3, 2020December 21, 2020 The Subtle Hazards of Real-World Cryptography by Soatok November 27, 2020November 30, 2020 Going Bark: A Furry’s Guide to End-to-End Encryption by Soatok November 14, 2020December 5, 2020 Deplatforming Hate and Harassment by Soatok November 12, 2020November 12, 2020 You’re Not Alone; It Gets Better by Soatok November 11, 2020November 11, 2020 A Brief Introduction to Deniability by Soatok November 4, 2020November 4, 2020 Bizarre Design Choices in Zoom’s End-to-End Encryption by Soatok October 28, 2020October 29, 2020 Solving For “Why?” by Soatok October 23, 2020October 23, 2020 Nearly Everyone Underestimates the Importance of Good Friendships by Soatok October 22, 2020October 22, 2020 Commission Prices for Furries and Artists by Soatok October 16, 2020October 17, 2020 Politics? In My Fandom? by Soatok October 13, 2020October 24, 2020 Vanity, Vendors, and Vulnerabilities by Soatok October 8, 2020October 13, 2020 Dead Ends in Cryptanalysis #1: Length Extension Attacks by Soatok October 6, 2020October 7, 2020 Two Weebs and a Furry Walk into a Bar by Soatok September 28, 2020October 31, 2020 Extinguishing a Flaming Pile of Bad Takes on My Doorstep by Soatok September 15, 2020September 16, 2020 EduTech Spyware is Still Spyware: Proctorio Edition by Soatok September 12, 2020November 13, 2020 Designing New Cryptography for Non-Standard Threat Models by Soatok September 9, 2020September 11, 2020 Soatok’s Guide to Side-Channel Attacks by Soatok August 27, 2020September 29, 2020 Amazing Furry Animators on YouTube by Soatok August 24, 2020August 24, 2020 A Few Missing Lessons from American Education by Soatok August 21, 2020October 31, 2020 All About Dholes and Dhole Fursonas by Soatok August 10, 2020August 10, 2020 A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates by Soatok July 24, 2020October 6, 2020 A Canned Response to My Viral Tweet by Soatok July 22, 2020July 22, 2020 Dorking Your Way to Search Results That Don’t Suck by Soatok July 21, 2020July 22, 2020 Kerlissions – Trivial Collisions in Iota’s Hash Function (Kerl) by Soatok July 15, 2020July 15, 2020 Comparison of Symmetric Encryption Methods by Soatok July 12, 2020September 8, 2020 A Word on Anti-Furry Sentiments in the Tech Community by Soatok July 9, 2020July 10, 2020 GNU: A Heuristic for Bad Cryptography by Soatok July 8, 2020November 12, 2020 Don’t Forget to Brush Your Fur by Soatok July 7, 2020July 7, 2020 Rhyner Writes – How to Chat with Furries by Soatok July 6, 2020July 6, 2020 How and Why America Was Hit So Hard By COVID-19 by Soatok July 2, 2020July 16, 2020 On Death and Subculture by Soatok June 29, 2020June 30, 2020 Resolving The Reoccurring Discourse on Furry Twitter by Soatok June 24, 2020August 31, 2020 The World Needs More Furry Bloggers by Soatok June 15, 2020October 31, 2020 Fuzzball Storytime – “The Fandom”: A Blast From the Past by Soatok June 14, 2020 How To Learn Cryptography as a Programmer by Soatok June 10, 2020June 10, 2020 #PrideMonth by Soatok June 9, 2020November 12, 2020 Furward Momentum – Introduction by Soatok June 8, 2020June 8, 2020 Learning from LadderLeak: Is ECDSA Broken? by Soatok May 26, 2020May 27, 2020 Why AES-GCM Sucks by Soatok May 13, 2020July 12, 2020 How to De-Anonymize Scam/Knock-off Sites Hiding Behind CloudFlare by Soatok May 9, 2020January 9, 2021 Fraudulent Apps on the Google Play Store: COVID-19 Contact Tracing Edition by Soatok May 8, 2020May 27, 2020 Putting the “Fun” in “Hash Function” by Soatok May 5, 2020May 8, 2020 Hedged Signatures with Libsodium using Dhole by Soatok May 3, 2020May 27, 2020 Furiosity Thrilled the Cat: Questions People Ask About the Furry Fandom by Soatok April 29, 2020May 1, 2020 Why Server-Side Input Validation Matters by Soatok April 27, 2020April 29, 2020 A Furry’s Guide to Digital Signature Algorithms by Soatok April 26, 2020May 3, 2020 Never Underestimate the Furry Fandom by Soatok April 23, 2020April 28, 2020 What Your Favorite Video Game Genre Says About Your Moral Character by Soatok April 23, 2020October 10, 2020 “Source Code Leak” is Effectively Meaningless to Endpoint Security by Soatok April 22, 2020May 27, 2020 Elliptic Curve Diffie-Hellman for Humans and Furries by Soatok April 21, 2020April 28, 2020 Authenticated Key Exchanges by Soatok April 21, 2020April 22, 2020 Welcome to Soatok.blog by Soatok April 21, 2020October 31, 2020 Share this:TwitterFacebookLike this:Like Loading...
Nearly Everyone Underestimates the Importance of Good Friendships by Soatok October 22, 2020October 22, 2020
Extinguishing a Flaming Pile of Bad Takes on My Doorstep by Soatok September 15, 2020September 16, 2020
Designing New Cryptography for Non-Standard Threat Models by Soatok September 9, 2020September 11, 2020
A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates by Soatok July 24, 2020October 6, 2020
How to De-Anonymize Scam/Knock-off Sites Hiding Behind CloudFlare by Soatok May 9, 2020January 9, 2021
Fraudulent Apps on the Google Play Store: COVID-19 Contact Tracing Edition by Soatok May 8, 2020May 27, 2020
Furiosity Thrilled the Cat: Questions People Ask About the Furry Fandom by Soatok April 29, 2020May 1, 2020
What Your Favorite Video Game Genre Says About Your Moral Character by Soatok April 23, 2020October 10, 2020
“Source Code Leak” is Effectively Meaningless to Endpoint Security by Soatok April 22, 2020May 27, 2020