
blog.cryptographyengineering.com/2014/02/cryptographic-obfuscation-and.html
Preview meta tags from the blog.cryptographyengineering.com website.
Linked Hostnames
32- 49 links toblog.cryptographyengineering.com
- 8 links toen.wikipedia.org
- 8 links towww.blogger.com
- 6 links toeprint.iacr.org
- 5 links towordpress.com
- 2 links towww.wired.com
- 1 link toacrab.isi.jhu.edu
- 1 link toblog.ethereum.org
Thumbnail

Search Engine Appearance
Cryptographic obfuscation and ‘unhackable’ software
I have a thing for over-the-top cryptography headlines -- mostly because I enjoy watching steam come out of researchers' ears when their work gets totally misrepresented. And although I've seen quite a few good ones, last week WIRED managed a doozy. The headline in question, Cryptography Breakthrough Could Make Software Unhackable, managed to accomplish something that few…
Bing
Cryptographic obfuscation and ‘unhackable’ software
I have a thing for over-the-top cryptography headlines -- mostly because I enjoy watching steam come out of researchers' ears when their work gets totally misrepresented. And although I've seen quite a few good ones, last week WIRED managed a doozy. The headline in question, Cryptography Breakthrough Could Make Software Unhackable, managed to accomplish something that few…
DuckDuckGo

Cryptographic obfuscation and ‘unhackable’ software
I have a thing for over-the-top cryptography headlines -- mostly because I enjoy watching steam come out of researchers' ears when their work gets totally misrepresented. And although I've seen quite a few good ones, last week WIRED managed a doozy. The headline in question, Cryptography Breakthrough Could Make Software Unhackable, managed to accomplish something that few…
General Meta Tags
9- titleCryptographic obfuscation and ‘unhackable’ software – A Few Thoughts on Cryptographic Engineering
- charsetUTF-8
- viewportwidth=device-width, initial-scale=1
- robotsmax-image-preview:large
- generatorWordPress.com
Open Graph Meta Tags
10- og:typearticle
- og:titleCryptographic obfuscation and ‘unhackable’ software
- og:urlhttps://blog.cryptographyengineering.com/2014/02/21/cryptographic-obfuscation-and/
- og:descriptionI have a thing for over-the-top cryptography headlines — mostly because I enjoy watching steam come out of researchers’ ears when their work gets totally misrepresented. And although I&…
- og:site_nameA Few Thoughts on Cryptographic Engineering
Twitter Meta Tags
3- twitter:text:titleCryptographic obfuscation and ‘unhackable’ software
- twitter:imagehttps://blog.cryptographyengineering.com/wp-content/uploads/2014/02/bd69f-breakthrough.png?w=144
- twitter:cardsummary
Link Tags
33- EditURIhttps://matthewdgreen.wordpress.com/xmlrpc.php?rsd
- alternatehttps://blog.cryptographyengineering.com/feed/
- alternatehttps://blog.cryptographyengineering.com/comments/feed/
- alternatehttps://blog.cryptographyengineering.com/2014/02/21/cryptographic-obfuscation-and/feed/
- alternatehttps://public-api.wordpress.com/oembed/?format=json&url=https%3A%2F%2Fblog.cryptographyengineering.com%2F2014%2F02%2F21%2Fcryptographic-obfuscation-and%2F&for=wpcom-auto-discovery
Links
104- http://blog.ethereum.org/2014/02/08/cryptographic-code-obfuscation-decentralized-autonomous-organizations-are-about-to-take-a-huge-leap-forward/comment-page-1
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.4672&rep=rep1&type=pdf
- http://courses.csail.mit.edu/6.885/spring05/papers/canetti-crypto97.pdf
- http://cryptopals.com
- http://en.wikipedia.org/wiki/Certificate_authority