All Blog Posts Dhole Moments, Soa Talks, and Other Bad Puns… Dogwhistles and Other Falsehoods Uttered About Furries by Soatok January 27, 2023January 27, 2023 How You Respond to Security Researchers Says Everything About You by Soatok January 21, 2023January 21, 2023 Hindsight is 2022 by Soatok January 6, 2023 What We Do in the /etc/shadow – Cryptography with Passwords by Soatok December 29, 2022January 7, 2023 Extending the AES-GCM Nonce Without Nightmare Fuel by Soatok December 21, 2022December 24, 2022 Security Research on Twitter: Before and After Musk’s Takeover by Soatok December 16, 2022December 18, 2022 Towards End-to-End Encryption for Direct Messages in the Fediverse by Soatok November 22, 2022November 29, 2022 Contemplating the Future by Soatok November 7, 2022November 7, 2022 Should You Delete Your Patreon Account After They Laid Off Their Entire Security Team? by Soatok September 9, 2022September 9, 2022 Hobbies Don’t Need to be Policed by Soatok September 6, 2022September 8, 2022 Cryptographic Agility and Superior Alternatives by Soatok August 20, 2022August 22, 2022 Burning Trust at the Quantum Village at DEFCON 30 by Soatok August 18, 2022August 19, 2022 Introducing Cupcake by Soatok July 6, 2022July 6, 2022 A Greymuzzle’s Lament by Soatok June 21, 2022June 23, 2022 When Soatok Used Bugcrowd by Soatok June 14, 2022August 24, 2022 Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022 by Soatok May 19, 2022May 23, 2022 Was the Buffalo Shooter A Furry? by Soatok May 16, 2022May 26, 2022 Bad Furries Aren’t Representative of the Entire Fandom by Soatok May 13, 2022May 14, 2022 The Dark Truth About the “Furry Protocol” by Soatok April 6, 2022October 2, 2022 On the (In)security of Social Media Callouts by Soatok March 30, 2022 Using RSA Securely in 2022 by Soatok February 9, 2022May 19, 2022 That One Time Furries Saved a Library by Soatok February 9, 2022March 28, 2022 The Controversy Surrounding Hybrid Cryptography by Soatok January 27, 2022January 28, 2022 Don’t Dunk the Gunk by Soatok January 12, 2022January 13, 2022 How to Remove Twitter Spaces by Soatok January 7, 2022January 28, 2022 For Your Infurmation by Soatok December 29, 2021December 29, 2021 Understanding HKDF by Soatok November 17, 2021May 19, 2022 My Blog Isn’t a Platform for Internet Randos by Soatok November 10, 2021 Threema: Three Strikes, You’re Out by Soatok November 5, 2021November 8, 2021 Against Web3 and Faux-Decentralization by Soatok October 19, 2021August 17, 2022 Furry Porn Against NFTs: A Call to Forearms by Soatok October 1, 2021October 19, 2021 The Bi-Symmetric Encryption Fraud by Soatok September 28, 2021August 17, 2022 Programmers Don’t Understand Hash Functions by Soatok August 24, 2021May 19, 2022 Timing Attack on SQL Queries Through Lobste.rs Password Reset by Soatok August 20, 2021October 19, 2021 Safer Illinois, Isn’t by Soatok August 17, 2021October 19, 2021 Lightning Round by Soatok August 16, 2021October 19, 2021 Selfishness: The Pandemic We Can’t Develop a Vaccine Against by Soatok August 9, 2021October 19, 2021 Canonicalization Attacks Against MACs and Signatures by Soatok July 30, 2021May 19, 2022 Furry Amino Sucks at Art Attribution by Soatok July 13, 2021October 19, 2021 Blue Alerts: Security Theater and Copaganda by Soatok July 2, 2021October 19, 2021 A Furry’s Guide to Telegram by Soatok June 22, 2021July 1, 2021 On the Word “Nonce” in Cryptography and the UK by Soatok June 11, 2021May 19, 2022 Dead Ends in Cryptanalysis #2: Timing Side-Channels by Soatok June 7, 2021June 7, 2021 Why Furries Make Excellent Hackers by Soatok June 2, 2021June 2, 2021 A Balanced Response to Allen Gwinn by Soatok May 19, 2021July 14, 2021 Avoiding the Frigid Hellscape of Online Marketing by Soatok May 18, 2021July 14, 2021 World Dhole Day 2021 by Soatok May 11, 2021May 11, 2021 Why I Chose to Be Vaccinated Against COVID-19 by Soatok May 10, 2021September 19, 2021 Against Hierarchies by Soatok April 21, 2021 A Furry’s Guide to Cryptocurrency by Soatok April 19, 2021April 19, 2021 The Furry / Sexuality Blog Post by Soatok April 2, 2021April 2, 2021 No, It’s Not Just You That’s Having a Hard Time Lately by Soatok March 27, 2021 Understanding Extended-Nonce Constructions by Soatok March 12, 2021May 19, 2022 No Gates, No Keepers by Soatok March 4, 2021July 14, 2021 Cryptography Interface Design is a Security Concern by Soatok February 24, 2021May 19, 2022 On The Toxicity of Zed A. Shaw by Soatok February 11, 2021July 14, 2021 Crackpot Cryptography and Security Theater by Soatok February 9, 2021August 17, 2022 Twitter’s Birdwatch is Fundamentally Flawed by Soatok January 27, 2021January 27, 2021 No, You’re Not a “Sigma Male” by Soatok January 25, 2021August 17, 2022 Please Stop Encrypting with RSA Directly by Soatok January 20, 2021May 19, 2022 Welcome to the Furry Fandom by Soatok January 14, 2021July 1, 2021 Block Cipher Structures: Ranked by Soatok January 11, 2021January 11, 2021 Masks Off for TheDonald.win by Soatok January 9, 2021July 14, 2021 The Story So Fur by Soatok December 24, 2020December 24, 2020 Cryptographic Wear-Out for Symmetric Encryption by Soatok December 24, 2020May 19, 2022 Putting Scammers on Scan on Twitter by Soatok December 11, 2020December 15, 2020 Opinionated Guides by Vega Deftwing by Soatok December 3, 2020December 21, 2020 The Subtle Hazards of Real-World Cryptography by Soatok November 27, 2020May 19, 2022 Going Bark: A Furry’s Guide to End-to-End Encryption by Soatok November 14, 2020May 19, 2022 Deplatforming Hate and Harassment by Soatok November 12, 2020November 12, 2020 You’re Not Alone; It Gets Better by Soatok November 11, 2020November 11, 2020 A Brief Introduction to Deniability by Soatok November 4, 2020November 4, 2020 Bizarre Design Choices in Zoom’s End-to-End Encryption by Soatok October 28, 2020October 29, 2020 Solving For “Why?” by Soatok October 23, 2020October 23, 2020 Nearly Everyone Underestimates the Importance of Good Friendships by Soatok October 22, 2020June 28, 2022 Commission Prices for Furries and Artists by Soatok October 16, 2020December 16, 2021 Politics? In My Fandom? by Soatok October 13, 2020October 24, 2020 Vanity, Vendors, and Vulnerabilities by Soatok October 8, 2020October 13, 2020 Dead Ends in Cryptanalysis #1: Length Extension Attacks by Soatok October 6, 2020June 7, 2021 Two Weebs and a Furry Walk into a Bar by Soatok September 28, 2020October 31, 2020 Extinguishing a Flaming Pile of Bad Takes on My Doorstep by Soatok September 15, 2020July 14, 2021 EduTech Spyware is Still Spyware: Proctorio Edition by Soatok September 12, 2020July 14, 2021 Designing New Cryptography for Non-Standard Threat Models by Soatok September 9, 2020May 19, 2022 Soatok’s Guide to Side-Channel Attacks by Soatok August 27, 2020May 19, 2022 Amazing Furry Animators on YouTube by Soatok August 24, 2020August 24, 2020 A Few Missing Lessons from American Education by Soatok August 21, 2020October 31, 2020 All About Dholes and Dhole Fursonas by Soatok August 10, 2020September 9, 2022 A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates by Soatok July 24, 2020October 6, 2020 A Canned Response to My Viral Tweet by Soatok July 22, 2020July 14, 2021 Dorking Your Way to Search Results That Don’t Suck by Soatok July 21, 2020July 22, 2020 Kerlissions – Trivial Collisions in Iota’s Hash Function (Kerl) by Soatok July 15, 2020July 8, 2021 Comparison of Symmetric Encryption Methods by Soatok July 12, 2020May 19, 2022 A Word on Anti-Furry Sentiments in the Tech Community by Soatok July 9, 2020July 10, 2020 GNU: A Heuristic for Bad Cryptography by Soatok July 8, 2020May 19, 2022 Don’t Forget to Brush Your Fur by Soatok July 7, 2020July 7, 2020 Rhyner Writes – How to Chat with Furries by Soatok July 6, 2020July 6, 2020 How and Why America Was Hit So Hard By COVID-19 by Soatok July 2, 2020July 16, 2020 On Death and Subculture by Soatok June 29, 2020March 9, 2021 Resolving The Reoccurring Discourse on Furry Twitter by Soatok June 24, 2020July 14, 2021 The World Needs More Furry Bloggers by Soatok June 15, 2020October 31, 2020
How You Respond to Security Researchers Says Everything About You by Soatok January 21, 2023January 21, 2023
What We Do in the /etc/shadow – Cryptography with Passwords by Soatok December 29, 2022January 7, 2023
Security Research on Twitter: Before and After Musk’s Takeover by Soatok December 16, 2022December 18, 2022
Towards End-to-End Encryption for Direct Messages in the Fediverse by Soatok November 22, 2022November 29, 2022
Should You Delete Your Patreon Account After They Laid Off Their Entire Security Team? by Soatok September 9, 2022September 9, 2022
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022 by Soatok May 19, 2022May 23, 2022
Timing Attack on SQL Queries Through Lobste.rs Password Reset by Soatok August 20, 2021October 19, 2021
Selfishness: The Pandemic We Can’t Develop a Vaccine Against by Soatok August 9, 2021October 19, 2021
Nearly Everyone Underestimates the Importance of Good Friendships by Soatok October 22, 2020June 28, 2022
A Brief Opinionated Overview of NIST’s Post-Quantum Cryptography Round 3 Candidates by Soatok July 24, 2020October 6, 2020