Stop using this common password trick β itβs more dangerous than you think
makeuseof.comΒ·20h
πopen source
Flag this post
Toward security-aware portable sequencing
nature.comΒ·22h
πopen source
Flag this post
Show HN: Privacy Experiment β Rewriting HTTPS, TLS, and TCP/IP Packet Headers
πopen source
Flag this post
SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography
eprint.iacr.orgΒ·4d
πopen source
Flag this post
New Attacks Against Secure Enclaves
πopen source
Flag this post
FreedomFest 2025 -- Naomi Brockwell, Beginner's Introduction to Privacy : CSPAN3 : November 10, 2025 8:59pm-9:24pm EST
archive.orgΒ·7h
π’mathematics
Flag this post
Simulating Clifford Circuits with Gaussian Elimination
arxiv.orgΒ·4h
π’mathematics
Flag this post
A Privacy-Preserving Federated Learning Method with Homomorphic Encryption in Omics Data
arxiv.orgΒ·4h
π’mathematics
Flag this post
Auth Series: Yet Another Password Authentication Flow.. but hear me out
πopen source
Flag this post
Derek Elkins: Umbral Calculus
hedonisticlearning.comΒ·1d
π’mathematics
Flag this post
Taking off the Mask: Forensic Analysis of Google Voice
blogs.dsu.eduΒ·13h
π’mathematics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
π’mathematics
Flag this post
AI Wealth Managers and Smart Contracts = Dead People Controlling Money Forever
π’mathematics
Flag this post
Getting Started With Queryable Encryption With the MongoDB EF Core Provider
πopen source
Flag this post
The Builder's Notes: Your CFO Just Called β Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.netΒ·1d
πopen source
Flag this post
FSF EU Notarization Complaint
mjtsai.comΒ·13h
πopen source
Flag this post
Forwarding packets at scale - Building a Cloud Data Plane using eBPF/XDP (denog17)
cdn.media.ccc.deΒ·15h
πopen source
Flag this post
Loading...Loading more...