Alice and Bob Learn: Chapter Discussions

Schedule:

--

--

--

Tanya Janca’s Application Security Adventures #WeHackPurple

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

“Think of it as a subscription — for your heart.”

Announcement that LBank has completed the reward distribution of “Celebrate the listing of ANY, and…

Facebook and the trade-off of centralised authentication

What’s the hesitation all about friend, lock your liquidity tokens with CryptExLocker today and…

$FUSII-BUSD LP staking rewards program on Pancake Swap is back!

Theory about VLAN

How to Hack into Someone’s Cell Phone

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
SheHacksPurple

SheHacksPurple

Tanya Janca’s Application Security Adventures #WeHackPurple

More from Medium

Most Harmful Social Engineering Attacks: Phishing, Vishing, and Smishing.

Lapsus$ Ransomware Group and Okta Breach

Robot Framework

How to setup two factor authentication using DUO security on SSH