🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·17hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
AES and Symmetric Key Encryption: The Key to Reliable Data Security
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”Cryptographic Archaeology
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·5h
πŸ”NTLM Forensics
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·1d
πŸ”“Password Cracking
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comΒ·23h
πŸ”¬Archive Forensics
How keys are used in FileVault and encryption
eclecticlight.coΒ·7h
πŸ’£Compression Security
Program Execution, follow-up
windowsir.blogspot.comΒ·1hΒ·
Discuss: www.blogger.com
⚑Performance Tools
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·1h
πŸ”Quantum Security
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·1h
🦠Malware Analysis
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
The Inefficiency in Digital Forensics
cyb3rops.medium.comΒ·2d
🚨Incident Response
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·17h
πŸ”—Data Provenance
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.orgΒ·2d
πŸ”’Language-based security
Building Digital Preservation Skills Using the DPC’s Novice to Know-How (N2KH) Courses
saaers.wordpress.comΒ·1d
πŸ”„Archival Workflows
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·12hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·7h
πŸ›οΈMainframe Archaeology
Week 25 – 2025
thisweekin4n6.comΒ·3d
🌐WARC Forensics
XOR Marks the Flaw in SAP GUI
darkreading.comΒ·1h
πŸ”“Hacking
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.comΒ·20h
πŸ’ΏOptical Forensics
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukΒ·13h
πŸ”Quantum Security
Loading...Loading more...
AboutBlogChangelogRoadmap