About a year and a half ago I started running. Not sure what drove me to it, but I guess some motivation behind it was as a way to get in better shape/health. I bought myself a cheap pair of running shoes and clothes and started out on a short run.
ReadI spent the last week and a few days at my family's summer place on the
ReadI found this great explanation of a length extension attack [here by Skullsecurity](https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks)
ReadEvery now and then me, my brother and some friends get together to play
ReadAnother niche attack. I happened to notice the interesting behaviour of
ReadContinuing on the subjects of timing attacks, I recently found a small
ReadI've been playing around with the idea of timing attacks lately. The way
ReadI played around yesterday with the idea of using QR-codes as an offline password storage. This way I don't have to rely on a database of passwords stored on my computer or in the cloud. I shudder at the thought of storing passwords in the cloud, encrypted or not. Instead my idea is to have printed QR codes in a binder, encrypted using a master password. To clarify, the content inside the QR code will be encrypted.
Read