redshiftzero
  • Categories
  • Tags
  • About

Post

2025

February

  • A gentle introduction to shielded transactions February 15

2020

December

  • Getting started in Rust and WebAssembly December 17
  • Creating Python extensions in Rust using PyO3 December 6

November

  • Continuous threat modeling, Part 1: Tooling wish list November 10

October

  • Investigating the Signal Protocol, Part 3: Web applications October 22
  • Investigating the Signal Protocol, Part 2: Groups, devices October 14
  • Investigating the Signal Protocol, Part 1: Foundations October 11
  • Scanning for onion service availability October 6

August

  • Tracking which wheels can be reproducibly built August 1

July

  • Protecting journalists from malware using QubesOS July 31
  • Using HTTPS Everywhere rules for SecureDrop onion names July 31

January

  • Handling equal priority jobs using queue.PriorityQueue January 13
  • A pytest fixture for image similarity January 12

2019

December

  • How to apply unittest.mock.patch December 1

November

  • Implementing the CBC padding oracle attack November 29
  • Using pyreverse to generate UML class diagrams November 25
  • Debugging programs with pdb November 23

July

  • Strategies for handling flaky test suites July 19

May

  • Collision attacks and the birthday paradox May 19

2018

June

  • Why Publishing Data on ICE Employees is in the Public Interest June 21

March

  • Visualizing Cosmological Power Spectra with d3.js March 30

2016

January

  • Primer on Police Surveillance January 19
© 1969–2025 
Powered by Hugo | Theme is MemE
CC BY-NC-SA 4.0