<?xml version="1.0" encoding="UTF-8"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
		http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
	<url>
		<loc>http://conorpp.com</loc>
	</url>
	<url>
		<loc>http://conorpp.com/designing-a-clock-with-levitating-arms-part-1/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/contact/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/tags/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/3d-printing-a-programming-jig-and-embedding-pogo-pins-using-eagle-and-fusion-360/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/designing-solo-a-new-u2ffido2-token/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/detecting-lines-on-technical-drawings/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/my-home-workspace/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/quick-electric-skateboard-build/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/u2f-zero-year-in-review/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/randomly-generating-3d-mazes-to-3d-print/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/proof-of-concept-for-a-reconfigurable-mold/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/last-post-on-emulating-a-credit-card/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/designing-a-credit-card-emulator-card/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/a-review-of-some-smt-buttons/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/designing-and-producing-2fa-tokens-to-sell-on-amazon/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/my-experience-going-to-defcon-and-sac/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/pearson-educations-client-side-method-for-checking-homework-answers/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/my-experience-with-dirtypcbscom/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/keyak-a-candidate-for-the-authenticated-encryption-standard/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/how-to-accelerate-a-program-with-hardware/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/linx-the-filesharing-server-every-hacker-should-know-about/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/a-close-look-at-an-operating-botnet/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/how-to-fix-a-corrupted-file-by-brute-force/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/proxying-bluetooth-devices-for-security-analysis-using-btproxy/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/class-prerequisite-graphs-for-vt/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/research/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/archive/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/08/24/How-to-support-PGP-encryption-in-Gmail/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/09/05/proxying-bluetooth-devices-for-security-analysis-using-btproxy/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/10/11/a-close-look-at-an-operating-botnet/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/10/17/using-a-docker-container-to-log-into-irc-via-tor/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/11/04/trying-out-lets-encrypt/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/11/09/linx-the-filesharing-server-every-hacker-should-know-about/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2015/12/16/how-to-accelerate-a-program-with-hardware/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2016/01/08/security-and-usage-of-braintree-a-paypal-backed-payment-gateway-api/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2016/02/17/keyak-a-candidate-for-the-authenticated-encryption-standard/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2016/03/13/my-experience-with-dirtypcbscom/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/2016/09/23/designing-and-producing-2fa-tokens-to-sell-on-amazon/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/3d-printing-a-programming-jig-and-embedding-pogo-pins/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/a-close-look-at-an-operating-botnet/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/a-survey-of-secure-microcontrollers/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/class-prerequisite-graphs-for-vt/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/designing-a-clock-with-levitating-arms-part-1/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/designing-a-credit-card-emulator-card/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/designing-and-producing-2fa-tokens-to-sell-on-amazon/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/designing-solo-a-new-u2ffido2-token/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/designing-somu-a-tiny-security-key/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/how-to-accelerate-a--program-with-hardware/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/how-to-fix-a-corrupted-file-by-brute-force/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/How-to-support-PGP-encryption-in-Gmail/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/proxying-bluetooth-devices-for-security-analysis-using-btproxy/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/quick-electric-skateboard-build/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/things-you-should-definitely-do-when-setting-up-a-product-line/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/trusting-digital-images-to-not-be-fake-or-altered/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/u2f-zero-year-in-review/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/blog/using-a-docker-container-to-log-into-irc-via-tor/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/resume/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/work/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/braintree_subdomain/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/photosby_subdomain/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/photosby_subdomain/contact/</loc>
	</url>
	<url>
		<loc>http://conorpp.com/publications/</loc>
	</url>
</urlset>