predr.ag/blog/xorry-not-sorry-most-amusing-security-flaws-ive-discovered

Preview meta tags from the predr.ag website.

Linked Hostnames

9

Thumbnail

Search Engine Appearance

Google

https://predr.ag/blog/xorry-not-sorry-most-amusing-security-flaws-ive-discovered

XORry Not Sorry: The Most Amusing Security Flaws I've Discovered

Building your own cryptographic protocols, and why you probably shouldn't.



Bing

XORry Not Sorry: The Most Amusing Security Flaws I've Discovered

https://predr.ag/blog/xorry-not-sorry-most-amusing-security-flaws-ive-discovered

Building your own cryptographic protocols, and why you probably shouldn't.



DuckDuckGo

https://predr.ag/blog/xorry-not-sorry-most-amusing-security-flaws-ive-discovered

XORry Not Sorry: The Most Amusing Security Flaws I've Discovered

Building your own cryptographic protocols, and why you probably shouldn't.

  • General Meta Tags

    5
    • title
      XORry Not Sorry: The Most Amusing Security Flaws I've Discovered
    • x-ua-compatible
      ie=edge
    • content-type
      text/html; charset=utf-8
    • viewport
      width=device-width, initial-scale=1.0, viewport-fit=cover
    • description
      Building your own cryptographic protocols, and why you probably shouldn't.
  • Open Graph Meta Tags

    5
    • og:type
      website
    • og:url
      https://predr.ag/blog/xorry-not-sorry-most-amusing-security-flaws-ive-discovered
    • og:image
      https://predr.ag/processed_images/shady-hand-moving-pointer.80c58c45135b94a9.jpg
    • og:description
      Building your own cryptographic protocols, and why you probably shouldn't.
    • og:title
      XORry Not Sorry: The Most Amusing Security Flaws I've Discovered
  • Twitter Meta Tags

    7
    • twitter:card
      summary
    • twitter:creator
      @PredragGruevski
    • twitter:site
      @PredragGruevski
    • twitter:image
      https://predr.ag/processed_images/shady-hand-moving-pointer.80c58c45135b94a9.jpg
    • twitter:image:alt
      A cartoonish computer sitting on a desk, with a desktop view displayed on the screen. A shady hand breaks the fourth wall, reaching directly into the computer screen to grab and control the mouse pointer.
  • Link Tags

    19
    • alternate
      https://predr.ag/atom.xml
    • apple-touch-icon
      https://predr.ag/processed_images/icon.41438b42377d932d.jpg
    • apple-touch-icon
      https://predr.ag/processed_images/icon.bbf913884fdb039f.jpg
    • apple-touch-icon
      https://predr.ag/processed_images/icon.e2467266f36cc9b3.jpg
    • apple-touch-icon
      https://predr.ag/processed_images/icon.2032d52d9c051642.jpg

Links

25