We describe several software side-channel attacks based on inter-process leakage through the sate of the CPU's memory cache. [...] experimentally demonstrate their applicability to real systems, such as OpenSSL and Linux's(Previously [heh, tags eventually came, but not as we had hoped].)
dm-cryptencrypted partitions (in the latter case, the full key can be recovered after just 800 writes to the partition, taking 65 milliseconds).
cryptography is depressing
http://github.com/agl/otc/tree/master: The CSS font-face property is great for web typography. Having to use images in order to get the correct…
I showed my friend Dan at work the crossword stuff I've been working on and he busted out his boggle solver, then proceeded to discuss the…