1. 2014-03-31 [4] [cryptography] Extended Random is extended to whom, exactly? cryptography ianG 2. 2014-03-27 [3] Re: [cryptography] To Tor or not to Tor? cryptography Jane 3. 2014-03-27 [2] [cryptography] Michael Haydon on the NSA spying -- blackberries cryptography Jeffrey Walton 4. 2014-03-25 [6] [cryptography] Compromised Sys Admin Hunters and Tor cryptography Nico Williams 5. 2014-03-21 [1] [cryptography] Using some crypto to make gov't dataset identifiers bette cryptography Eric Mill 6. 2014-03-21 [1] [cryptography] Dynasty of Compromised Comsec and Legal Protection cryptography John Young 7. 2014-03-17 [2] [cryptography] Journalists Shill Sources and Secrets cryptography John Young 8. 2014-03-17 [9] [cryptography] Comsec as Public Utility Beyond Illusory Privacy cryptography John Young 9. 2014-03-15 [9] [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets cryptography grarpamp 10. 2014-03-14 [5] [cryptography] Client certificates, Tor-exit nodes and renegotiation cryptography Guido Witmond 11. 2014-03-13 [3] [cryptography] Privacy Enforced [was: Comsec as Public Utility Beyond Il cryptography coderman 12. 2014-03-13 [2] [cryptography] TAO QUANTUMINSERT Bonanza cryptography John Young 13. 2014-03-10 [1] Re: [cryptography] NIST asks for comment on its crypto standards process cryptography coderman 14. 2014-03-10 [6] [cryptography] Commercialized Attack Hardware on SmartPhones cryptography coderman 15. 2014-03-10 [2] Re: [cryptography] [Cryptography] BitCoin bug reported cryptography coderman 16. 2014-03-10 [1] Re: [cryptography] Alleged NSA-GCHQ Attack on Jean-Jacques Quisquater cryptography coderman 17. 2014-03-10 [1] Re: [cryptography] Jean-Jacques Quisquater on Alleged NSA-GCHQ Hack cryptography coderman 18. 2014-03-10 [1] Re: [cryptography] Snowden Drop to Poitras and Greenwald Described cryptography coderman 19. 2014-03-02 [3] [cryptography] Fwd: Re: Commercialized Attack Hardware on SmartPhones cryptography Jacob Appelbaum