The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Cryptographic Archaeology
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.ioยท1d
๐๏ธPostgreSQL WAL
Flag this post
eBPF Rootkit
๐ก๏ธeBPF Security
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท2d
๐Quantum Security
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Cryptographic Archaeology
Flag this post
A report from our 2025 conference on โRecords at Riskโ
britishrecordsassociation.org.ukยท3d
๐records management
Flag this post
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
tenable.comยท2d
๐ Homelab Security
Flag this post
backing up the entire home-folder of my notebook: methods & procedures on command line: rsync, tar... etx:
forums.anandtech.comยท2d
๐ฟBackup Strategies
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
๐WebRTC Archives
Flag this post
A Paper Caper: The Hole Data
hackaday.comยท1d
๐งชCassette Hacks
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.comยท1d
๐Family History Data
Flag this post
NEWS ROUNDUP โ 21st November 2025
digitalforensicsmagazine.comยท1d
๐จIncident Response
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comยท1d
๐ฏNTLM Attacks
Flag this post
Cryptology Group Held an Election, but Canโt Decrypt the Results
๐Archive Cryptanalysis
Flag this post
Hyper-Secure Code Generation via Lattice-Based Homomorphic Encryption & AI-Assisted Verification
๐Homomorphic Encryption
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ญCultural Informatics
Flag this post
Explainer: Data and metadata
eclecticlight.coยท21h
๐ท๏ธMetadata Standards
Flag this post
Loading...Loading more...