Timeline for Rehash “How secure is my X” cryptography questions
Current License: CC BY-SA 3.0
16 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jun 10, 2020 at 13:09 | history | edited | CommunityBot |
Commonmark migration
|
|
| Apr 13, 2017 at 12:41 | history | edited | CommunityBot |
replaced http://codereview.stackexchange.com/ with https://codereview.stackexchange.com/
|
|
| Mar 17, 2017 at 10:46 | history | edited | CommunityBot |
replaced http://security.stackexchange.com/ with https://security.stackexchange.com/
|
|
| Mar 16, 2017 at 16:03 | history | edited | CommunityBot |
replaced http://meta.codereview.stackexchange.com/ with https://codereview.meta.stackexchange.com/
|
|
| Mar 16, 2017 at 16:03 | history | edited | CommunityBot |
replaced http://meta.codereview.stackexchange.com/ with https://codereview.meta.stackexchange.com/
|
|
| Apr 1, 2016 at 23:11 | history | tweeted | twitter.com/StackCodeReview/status/716040267548246018 | ||
| Mar 29, 2016 at 11:54 | comment | added | Phrancis | @GabeEvans of course :-) | |
| Mar 29, 2016 at 5:44 | comment | added | Gabe Evans | Please tell me that the pun in the title was intentional... | |
| Mar 29, 2016 at 1:44 | answer | added | Jerry Coffin | timeline score: 8 | |
| Mar 28, 2016 at 13:28 | vote | accept | Phrancis | ||
| Mar 24, 2016 at 19:58 | comment | added | Phrancis | @200_success Not immediately, I don't. I was asking more in general, but I will look for some soon and see what I can find | |
| Mar 24, 2016 at 19:57 | comment | added | 200_success Mod | Do you have specific examples of questions that you think should be referred to Information Security? | |
| Mar 24, 2016 at 19:55 | answer | added | 200_successMod | timeline score: 15 | |
| Mar 24, 2016 at 19:51 | comment | added | Simon Forsberg Mod | "IT Security Stack Exchange is for Information Security professionals (...)". A lot of the questions we get about cryptography are things like XOR encryption or Caesar ciphers, and some amateur home-made encryption algorithms. I doubt most of those questions would be well-received on IT Security. | |
| Mar 24, 2016 at 19:25 | history | edited | Phrancis | CC BY-SA 3.0 |
deleted 14 characters in body
|
| Mar 24, 2016 at 19:17 | history | asked | Phrancis | CC BY-SA 3.0 |