The Privacy Manifesto
zac1258019.substack.com·1d·
Discuss: Substack
🧩Category Theory
Flag this post
Towards the Perfect Coin Flip: The NIST Randomness Beacon (2014)
hackaday.com·2h·
Discuss: Hacker News
🦀Rust
Flag this post
Quantum-Enhanced Key Distribution with Adaptive Error Correction via Tensor Network Optimization
dev.to·11h·
Discuss: DEV
⚗️Elixir
Flag this post
Experimental Results on Goldbach's Conjecture
dev.to·6h·
Discuss: DEV
🧩Category Theory
Flag this post
I made 36 key keymap for some ethnic typers
i.redd.it·1d·
🦀Rust
Flag this post
12 steps you can take right now to be safer online
engadget.com·11h
🦀Rust
Flag this post
Daniel Vérité: Producing UUIDs Version 7 disguised as Version 4 (or 8)
postgresql.verite.pro·3d
⚗️Elixir
Flag this post
Vercel now supports post-quantum cryptography
vercel.com·1d
🧩Category Theory
Flag this post
Phishing Threats Prompt Call for Wider Adoption of Passkeys
pymnts.com·1d
🦀Rust
Flag this post
Universality Classes for Purification in Nonunitary Quantum Processes
journals.aps.org·23h
🧩Category Theory
Flag this post
Chebyshev Polynomials are Ferraris for Numerical Programmers
leetarxiv.substack.com·1d·
⚗️Elixir
Flag this post
How to Set Up Valkey, The Alternative to Redis
percona.com·1d
⚗️Elixir
Flag this post
How Signal's New Triple Ratchet Protocol Fortifies Your Privacy
zeroday.forem.com·2d·
Discuss: DEV
⚗️Elixir
Flag this post
Is cryptography in Go hard?
reddit.com·2d·
Discuss: r/golang
⚗️Elixir
Flag this post
How to reverse engineer USB HID on Linux
popovicu.com·9h·
Discuss: r/linux
🦀Rust
Flag this post
New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
eprint.iacr.org·3d
⚗️Elixir
Flag this post
Dennis Ritchie's story of dabbling in the cryptographic world
web.archive.org·2d·
Discuss: Hacker News
🧩Category Theory
Flag this post
DOTS from double theories
topos.institute·11h
🧩Category Theory
Flag this post
Help with LLM Research Paper! Urgent!!!
github.com·2h·
Discuss: r/LLM
⚗️Elixir
Flag this post