🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

A Standard for Human-Centered Investigation Playbooks
chrissanders.orgΒ·3h
🎯Threat Hunting
AES and Symmetric Key Encryption: The Key to Reliable Data Security
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”Cryptographic Archaeology
Digital Forensics Round-Up, June 25 2025
forensicfocus.comΒ·8h
πŸ”¬Archive Forensics
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·20hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·14h
πŸ”NTLM Forensics
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·2d
πŸ”“Password Cracking
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
securityscorecard.comΒ·7h
🌳Archive Merkle Trees
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·9h
πŸ”Quantum Security
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·1dΒ·
Discuss: Hacker News
πŸ”Systems Hardening
Program Execution, follow-up
windowsir.blogspot.comΒ·10hΒ·
Discuss: www.blogger.com
⚑Performance Tools
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·10h
🦠Malware Analysis
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·17h
🌊Stream Ciphers
The Inefficiency in Digital Forensics
cyb3rops.medium.comΒ·2d
🚨Incident Response
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.orgΒ·2d
πŸ”’Language-based security
Building Digital Preservation Skills Using the DPC’s Novice to Know-How (N2KH) Courses
saaers.wordpress.comΒ·2d
πŸ”„Archival Workflows
North Korea - Cyber Threat Actor Profile
cstromblad.comΒ·4h
πŸ‡ΈπŸ‡ͺNordic Cryptography
5 huge stumbling blocks to legacy mainframe EOL
techradar.comΒ·15h
πŸ›οΈMainframe Archaeology
How keys are used in FileVault and encryption
eclecticlight.coΒ·16hΒ·
Discuss: Lobsters, Hacker News
πŸ’£Compression Security
XOR Marks the Flaw in SAP GUI
darkreading.comΒ·9h
πŸ”“Hacking
Week 25 – 2025
thisweekin4n6.comΒ·3d
🌐WARC Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap