46 Hacker News submissions for Evervault

HN Points HN Title (Links to submission) Submitted Date
229 Claude Shannon: The Mathematical Theory of Cryptography 2021-03-17
108 Evervault 2021-12-17
81 How we built the Evervault Encryption Engine (E3) 2021-08-10
67 The most important cryptography papers 2024-05-03
26 Shamir's Secret Sharing Visualised 2022-10-05
16 Is Encryption at Rest a Scam? 2023-09-21
16 Why enclaves exist: from von Neumann to secure enclaves 2023-04-27
16 Evervault: encryption infrastructure for developers 2021-08-31
15 How to encrypt a string in less than 5 minutes 2022-09-29
13 We Built Cages: Deploying to an Enclave 2023-04-04
12 Did DORA's last update create an encryption loophole? 2024-10-23
12 Understanding Quantum Cryptography 2023-06-22
11 The Danish Sugar Beats Auction pioneered privacy-first multi-party computation 2023-08-10
11 Build, deploy and scale secure enclaves using Evervault Cages 2023-02-09
9 How We Built Evervault Relay 2022-03-08
6 Building an Open-Source Runtime for Confidential Computing on Nitro Enclaves 2023-03-30
5 We Built Cages: TLS cert provisioning and secrets management in an enclave 2023-04-11
5 Can Google's federated learning strategy be exploited? 2023-07-10
5 A Visualisation of Shamir's Secret Sharing Scheme 2022-10-08
4 How to address unexpected clock drift when building on AWS Nitro Enclaves 2024-02-27
4 Show HN: Evervault Enclaves – Confidential Computing made easy 2024-01-10
4 Optimizing encryption speed with Rust and AWS Nitro Enclaves 2023-05-11
3 A security paradigm for 2024: Access To, Access From (ATAF) 2023-12-05
3 The Story and Math of Differential Cryptanalysis 2023-09-27
3 Building Cages: Open-Source Runtime for Confidential Computing on Nitro Enclaves 2023-03-28
3 What’s going on with SHA-1? (it’s in SHAmbles) 2023-03-23
3 Zero Day Security 2022-09-03
3 The Evervault Encryption Manifesto 2021-08-11
2 API integrations are making the internet less secure (opinion piece) 2023-06-01
2 Show HN: Redact PII for OpenAI with a simple proxy 2023-07-19
2 Code Attestation needs to be easier 2023-05-30
2 What are Network Tokens and how do they work? 2024-11-14
2 The power and limits of confidential computing 2024-02-21
2 A case for encryption by third-party proxy 2023-08-11
2 A Guide to Good DX, Part 1: Introducing DXmas 2022-12-01
2 Code That Encrypts Itself (encrypted equivalent of a Quine) 2022-10-14
1 How We Built Enclaves: Routing Traffic with Consul 2024-02-08
1 Enclave Networking with Iptables 2024-02-01
1 Show HN: Evervault Enclaves 2024-01-16
1 Data Policies: Applying IAM to data instead of encryption keys 2023-11-09
1 Quantum secrecy – A brief on quantum cryptography and quantum cryptanalysis 2023-07-03
1 We Built Cages: Our Take on Secure Enclaves 2023-03-09
1 Stibitz: The father of the modern digital computer 2023-01-31
1 How to Build an App with Field Level Encryption 2022-09-22
1 Tokenization vs. In-House Encryption vs. Evervault Encryption – Blog – Evervault 2022-08-20
1 Evervault Payments Config 2022-05-26