Dhole Moments, Soa Talks, and Other Bad Puns…

Return to Office Is Bullshit And Everyone Knows It
I quit my job towards the end of last month. When I started this blog, I told myself, “Don’t talk about work.” Since my employment is in the rear view mirror, I’m going to bend that rule for once. And most likely, only this one time. Why? Since I wrote a whole series about how…
DEFCON Quantum Village 2: Electric Boogaloo
Last year, I went to the Quantum Village and encountered some absolute bullshit, which I proceeded to call out. This year, while I was walking around the Crypto + Privacy Village at DEFCON 31 in fursuit, a wild Cendyne approached me and asked, “There are going to be some debates at the Quantum Village; do…

On Furries and the Media
Recently, there has been a lot of misinformation and propaganda flying around the American news media about the furry fandom. Unfortunately, this seems to be increasing with time. Consequently, there are a lot of blanket statements and hot takes floating around social media right now about whether or not furries should talk with journalists. That…

Something to Always Keep in Mind
Regular readers of Dhole Moments should always keep this in mind:

Asymmetric Cryptographic Commitments
Recently, it occurred to me that there wasn’t a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don’t look at the scroll bar) blog post on database cryptography., and that’s definitely relevant. I had also touched on the subject of commitment…


Dogwhistles and Other Falsehoods Uttered About Furries
A quick reference to anti-furry dog-whistles for busy journalists and investigative reporters.

How You Respond to Security Researchers Says Everything About You
Tails from the Cryptographic Side of Security Research

What We Do in the /etc/shadow – Cryptography with Passwords
Ever since the famous “Open Sesame” line from One Thousand and One Nights, humanity was doomed to suffer from the scourge of passwords. Even in a world where we use hardware tokens with asymmetric cryptography to obviate the need for passwords in modern authentication protocols, we’ll still need to include “something you know” for legal…
Loading…
Something went wrong. Please refresh the page and/or try again.
Follow My Blog
Get new content delivered directly to your inbox.