WTF is a KDF?
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/wtf-is-a-kdf/wtf-is-a-kdf.small.jpg)
Computers can be understood
The Big Hack
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/the-big-hack/the-big-hack.small.jpg)
A Primer on Public-key Encryption
Continuous Delivery Sounds Great, but Will It Work Here?
Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown.small.jpg)
The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/the-ukrainian-hacker-who-became-the-fbis-best-weapon-and-worst-nightmare/the-ukrainian-hacker-who-became-the-fbis-best-weapon-and-worst-nightmare.small.jpg)
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/how-omnipotent-hackers-tied-to-nsa-hid-for-14-years-and-were-found-at-last/how-omnipotent-hackers-tied-to-nsa-hid-for-14-years-and-were-found-at-last.small.jpg)
How Spies Stole the Keys to the Encryption Castle
How Two Men Unlocked Modern Encryption
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/how-two-men-unlocked-modern-encryption/how-two-men-unlocked-modern-encryption.small.jpg)
In Hours, Thieves Took $45 Million in A.T.M. Scheme
![](https://storage.googleapis.com/eleith-io-site/images/pieces/links/in-hours-thieves-took-45-million-in-at-m-scheme/in-hours-thieves-took-45-million-in-at-m-scheme.small.jpg)
rethinking-the-computer-at-80.html?src=dayp