Hackernews posts about Authy
- How Thai authorities use online doxxing to suppress dissent (citizenlab.ca)
- Fun ways of deciding authorship order (2016) (dynamicecology.wordpress.com)
- Using –/.ssh/authorized keys to decide what the incoming connection can do (dan.langille.org)
- Certification Authority/Browser Forum adopts new security standards (security.googleblog.com)
- Audiobooks vs. Printed Books: a debate as a reader and an author (newsandreviews.substack.com)
- Show HN: An open source OAuth/auth system (github.com)
- The Authenticity Drought (soatok.blog)
- SSHd and AuthorizedKeysCommand (jpmens.net)
- Grievance of Time: System Calls We Never Authorized (smolnero.com)
- Plebiscitary Override in Venezuela: Eroding Democracy Deepening Authoritarianism (journals.sagepub.com)
- Genetic data repo OpenSNP to self-destruct before authoritarians weaponize it (www.theregister.com)
- Preprint study: GPT-4.5 is the first AI model to pass an authentic Turing test (www.livescience.com)
- Algorithmic Authority: The Case of Bitcoin (arxiv.org)
- Secure Authentication Layer with Authentication Zero for Ruby on Rails (blog.appsignal.com)
- Steam Auth Issues – Grumpy Gamer (grumpygamer.com)
- Authorization in MCP Servers: What's Missing and What's Coming (maxhammad.substack.com)