Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Software Blogs  >  Dhole Moments - Software, Security, Cryptography, and the Furry Fandom software Blog  > 

Dhole Moments - Software, Security, Cryptography, And The Furry Fandom Blog


soatok.blog
Blogarama's Sponsor
Gay security expert with a fursona writes about cryptography, the furry community, computer security, society, and many other topics. It's never a dull moment at Dhole Moments.
Hindsight Is 2022
2023-01-06 07:01
I’ve had a couple people ask me if I would do a yearly recap blog post like I did for 2021 and 2020 previously. Unfortunately, the year opened the same way it closed: Twitter. Tw… Read More
Contemplating The Future
2022-11-07 10:06
As everyone knows, Elon Musk is now running Twitter directly into the ground. Who knows? Maybe he needed some inspiration for the Boring Company. Art: Chai Lynx This has, as many predic… Read More
2022-09-06 08:07
The Furry Fandom is many things to many people, and it’s difficult to pin a single definition for it down. If you ask 10 furries to explain the furry fandom, you’re likely to end… Read More
Introducing Cupcake
2022-07-06 07:46
The greatest risk to the security of a web application is when it either accepts user input and processes it or renders data in a comprehensible format (HTML, JSON, etc.) to the user. For… Read More
A Greymuzzle’s Lament
2022-06-21 08:08
A mech fan wakes from a terrible nightmare. In her dream, she finds herself in a society where anthropomorphic robot and cyborg art is widely considered cringe by popular society, and romant… Read More
When Soatok Used Bugcrowd
2022-06-14 22:53
I’ve worked in software security for a long time. One of my earliest blog posts cited my HackerOne profile as a data point for taking my opinion seriously, but I never really considere… Read More
Was The Buffalo Shooter A Furry?
2022-05-16 23:07
Content Warning: Mass shooting, conspiracy theory weirdos, homophobia, transphobia, and all sorts of bigotry. Basically if you have any triggers at all, definitely sit this one out. This… Read More
Using RSA Securely In 2022
2022-02-10 00:11
If you can somehow avoid using RSA (i.e. using Elliptic Curve Cryptography instead), then don’t use RSA at all. Then you can skip this blog post entirely and all is right in the world… Read More
That One Time Furries Saved A Library
2022-02-09 11:52
It all started with an article in the Mississippi Free Press by Nick Judin. Ridgeland Mayor Gene McGee is withholding $110,000 of funding from the Madison County Library System allegedly… Read More
Don’t Dunk The Gunk
2022-01-12 09:00
It happened again. You were doom-scrolling on the hellsite (a.k.a. browsng Twitter) and stumbled upon some stranger’s tweet that was so stunningly ignorant that it almost seems artific… Read More
How To Remove Twitter Spaces
2022-01-07 19:06
Twitter Spaces are an annoying feature that you can’t turn off that consume part of your precious screen real estate on the official Twitter for Android App (and presumably the iOS app… Read More
For Your Infurmation
2021-12-29 20:17
In the spirit of my 2020 recap, I thought it’d be fun to look back at everything that happened on this blog in 2021. Controversy Strikes The year opened with my most controversia… Read More
Understanding HKDF
2021-11-17 11:46
NIST opened public comments on SP 800-108 Rev. 1 (the NIST recommendations for Key Derivation Functions) last month. The main thing that’s changed from the original document published… Read More
2021-11-05 08:54
(If you aren’t interested in the background information, feel free to skip to the meat of this post. If you’re in a hurry, there’s a summary of results at the end.) Arou… Read More
2021-10-19 07:00
Cryptocurrency grifts come in many shapes and sizes. You have the “Elon Musk giveaway” scams from hacked Twitter accounts. You have people who lurk on trading platforms (e.g… Read More
2021-09-28 11:41
Earlier this year I discussed some noteworthy examples of crackpot cryptography and snake-oil security on this blog. In this post, I’m going to analyze the claims made by CEW System… Read More
2021-08-20 15:07
Just to assuage any panic, let me state this up front. If you’re reading this blog post wondering if your Lobste.rs account is at risk, good news: I didn’t publish it until af… Read More
2021-08-17 11:02
TL;DR: Don’t stop using the app. It’s not unsafe enough to warrant jettisoning entirely, and the pandemic is a much, much higher concern. Safer Illinois is, according to their… Read More
2021-08-16 17:00
Last year I wrote a grab-bag post titled, Don’t Forget To Brush Your Fur, because I’m terrible at SEO or making content easily discoverable. In the same vein as that previous… Read More
2021-07-13 22:36
Over the weekend, I decided to make an account on Furry Amino. My reasoning at the time was, “A lot of furries lurk there, I should see what it’s about.” That was a bad… Read More
Trivial Proof Of The Collatz Conjecture
2021-07-09 00:58
The Collatz conjecture is an allegedly-unsolved problem in mathematics. I say allegedly there because, reading those words, I feel like mathematicians are going to jump out from my closet… Read More
2021-06-22 07:06
A question I often get–especially from cryptography experts: What is it with furries and Telegram? furry group chat pamphlet pic.twitter.com/j5McTTzGuY— Tay (@Monochromemu… Read More
Why Furries Make Excellent Hackers
2021-06-03 02:40
There are a lot of excellent computer hackers in the world, and many of them are also furries. However, there are a lot more furries than excellent computer hackers in the world, so you w… Read More
A Balanced Response To Allen Gwinn
2021-05-19 09:22
Allen Gwinn is a Professor of Practice at the Southern Methodist University’s Cox School of Business. In a recent article published by The Hill, Allen Gwinn shared his bad opinions abo… Read More
2021-05-11 10:21
The Dhole Conservation Fund decided to make the 28th of May this year the first annual World Dhole Day (because it’s normally Whistling Day, and dholes are whistling dogs). Image pr… Read More
2021-04-21 13:58
One of the funniest concepts for a YouTube channel has to be TierZoo, which treats the animal kingdom as an MMORPG and animal species as different classes within this hypothetical game, and… Read More
A Furry’s Guide To Cryptocurrency
2021-04-19 10:21
Normally when you see an article that talks about cryptocurrency come across your timeline, you can safely sort it squarely into two camps: For and Against. If you’re like me, you migh… Read More
2021-04-02 11:30
If you’ve somehow never encountered an Internet meme before, you may be surprised to learn that the number 69 is often associated with sex (and, more specifically, a particular sex act… Read More
2021-03-12 09:47
Most of the data encrypted on the Internet these days uses an AEAD mode, which consists of a stream cipher (which may be built out of a hash function or a block cipher) and a polynomial auth… Read More
2021-03-05 04:54
I get a lot of emails from job recruiters that, even to this day, I’m not qualified for. They often ask for ridiculous requirements, like a Master’s Degree or Ph.D in Computer Sc… Read More
2021-02-11 14:12
Let me say up front, I’m no stranger to negative or ridiculous feedback. It’s incredibly hard to hurt my feelings, especially if you intend to. You don’t openly participate… Read More
Crackpot Cryptography And Security Theater
2021-02-09 10:38
A few years ago, when the IETF’s Crypto Forum Research Group was deeply entrenched in debates about elliptic curves for security (which eventually culminated in RFC 7748 and RFC 8032)… Read More
2021-01-26 04:32
The year 2021 has taught us, if nothing else, that we can be sure that lies, misinformation, and bullshit are post-scarce resources in modern society. In such an information economy, it s… Read More
2021-01-14 11:21
Whether you’re curious about the furry community or already decided to participate, allow me to extend you a warm welcome to the furry fandom. Since you’re probably new, her… Read More
2021-01-11 07:29
If you’re like most people, you don’t have strong opinions about the internal structures of block ciphers. You’re likely perfectly happy using something standard in a stand… Read More
Masks Off For TheDonald.win
2021-01-09 12:59
In 2015, a subreddit called /r/The_Donald was created. This has made a lot of people very angry and widely been regarded as a bad move. Roughly 5 years after its inception, the Reddit sta… Read More
2020-12-24 07:53
I started this blog in April 2020 after a brief and irregular stint as a writer on Medium, because while I like putting my thoughts on a screen, I really disliked how Medium’s website… Read More
Putting Scammers On Scan On Twitter
2020-12-12 00:05
Earlier tonight, someone decided to change their Twitter handle and display name to impersonate a furry and solicit money to the scammer’s PayPal account. DO NOT SEND MONEY TO THIS… Read More
2020-12-04 04:05
Vega of Opinionated Guides (OpGuides for short) recently asked to interview me for their website hosted on Github Pages. You can read the interview here if that strikes your fancy. Opinio… Read More
How To Migrate RSA SSH Keys
2020-11-19 04:02
The OpenSSH team recently announced the removal of support for ssh-rsa keys in OpenSSH. This announcement was met with a modest and well-deserved fanfare from cryptographers, because RSA suc… Read More
Deplatforming Hate And Harassment
2020-11-12 06:18
Earlier this year, I detailed a simple technique for deanonymizing scam sites on CloudFlare, by getting the back-end webserver to email you and reveal the server’s IP address (so you c… Read More
You’re Not Alone; It Gets Better
2020-11-11 05:28
We’ve more-or-less all been coping with the pandemic since early March. During this time, I’ve seen a lot of people stressed and depressed to their breaking points, usually wh… Read More
2020-11-04 16:17
Earlier this week, security researcher Ryan Castellucci published a blog post with a somewhat provocative title: DKIM: Show Your Privates. After reading the ensuing discussions on Hacker… Read More
Solving For “Why?”
2020-10-23 10:59
The cryptography and information security experts who read my blog probably wonder from time to time, “Why furries though?” which I’ve spent ample time answering and hopefu… Read More
Commission Prices For Furries And Artists
2020-10-16 13:20
A frequent source of confusion in the furry fandom is about commission pricing for furry art. This confusion is often driven by (usually younger) furries demanding free or severely cheap… Read More
2020-10-13 12:18
I dislike politics in general. That doesn’t mean I don’t write about it when it’s relevant, but I’m always less happy with any of my writing that touches on these… Read More
Vanity, Vendors, And Vulnerabilities
2020-10-09 03:50
Tonight on InfoSec Twitter, this gem was making the rounds: Hello cybersecurity and election security people, I sometimes embed your tweets in the Cybersecurity 202 newsletter. Some of y… Read More
Two Weebs And A Furry Walk Into A Bar
2020-09-28 08:48
Serious question: Why doesn’t the Furry Fandom have more comedians? Art by Khia. I don’t mean racist loudmouth assholes who wouldn’t know a good joke if it cup-checke… Read More
Soatok’s Guide To Side-Channel Attacks
2020-08-27 11:57
If you’re ever tasked with implementing a cryptography feature–whether a high-level protocol or a low-level primitive–you will have to take special care to ensure you&rsquo&hell…Read More
2020-08-24 09:36
Being a furry is like: Every once in a while, you’ll stumble across an enormous contingent of the furry fandom that you were entirely unaware of for years. Sure, you’d expect… Read More
2020-08-10 07:00
Some of you may be surprised to learn that my fursona is not a fox, nor a wolf; nor is it a fictitious fox-wolf hybrid popular within the furry fandom (which is usually called a “folf… Read More
2020-07-22 09:36
This is a bit different from my usual blog post, insofar as I don’t have much of a point except that I’m tired of repeating myself. The other day, I was frustrated about Pinte… Read More
Comparison Of Symmetric Encryption Methods
2020-07-12 21:33
There seems to be a lot of interest among software developers in the various cryptographic building blocks (block ciphers, hash functions, etc.), and more specifically how they stack up agai… Read More
GNU: A Heuristic For Bad Cryptography
2020-07-08 17:59
If you see the letters GNU in a systems design, and that system intersects with cryptography, I can almost guarantee that it will be badly designed to an alarming degree. This is as true… Read More
Don’t Forget To Brush Your Fur
2020-07-07 14:05
There are a lot of random topics I’ve wanted to write about since I started Dhole Moments, and for one reason or another, haven’t actually written about. I know from past experie… Read More
On Death And Subculture
2020-06-30 03:45
This year (2020) has brought a lot of death. Friends, neighbors, coworkers, family members, and even some of the strangers you saw every day in your commute to work but never even stopped… Read More

Share the post

Dhole Moments - Software, Security, Cryptography, and the Furry Fandom

×

Subscribe to Dhole Moments - Software, Security, Cryptography, And The Furry Fandom

Get updates delivered right to your inbox!

Thank you for your subscription

×