🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Mary Queen of Scots’ political scheming revealed in decoded missing letters
the-independent.com·8h
🗝️Paleocryptography
Boomerang carved from mammoth tusk shows ‘Homo sapiens’ had symbolic thinking 42,000 years ago
english.elpais.com·1h
🦴Database Paleontology
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.com·1d
🔒Hardware Attestation
How to Prove That An Email Was Received
metaspike.com·21h
📄Document Digitization
Show HN: What it took to make QKD work in RAM
qsymbolic.com·4h·
Discuss: Hacker News
🔐Quantum Security
Vitaly Kovalev, the Russian hacker who has offices and gives bonuses to his employees
english.elpais.com·2h
🔓Hacking
Fixes for five Lix CVEs
lix.systems·2d·
Discuss: Lobsters
❄️Nix Adoption
Reflecting JSON into C++ Objects
brevzin.github.io·4h·
Discuss: Lobsters, Hacker News, r/cpp
🔧Binary Parsers
Why document-borne malware needs to be back on the radar for organization
techradar.com·2d
🔓Hacking
The Impact of the Russia-Ukraine Conflict on the Cloud Computing Risk Landscape
arxiv.org·13h
🖥️Self-hosted Infrastructure
Machine Learning Fundamentals: active learning with python
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Introducing S21 Spotlight Sessions: Try The Tools. Skip The Sales Pitch.
forensicfocus.com·3h
💿Optical Forensics
SSL and TLS Deployment Best Practices
github.com·1d·
Discuss: Hacker News
🔐Certificate Analysis
Exploiting Android Components in Seconds
infosecwriteups.com·6h
⚡Performance Tools
️ Stop API Key Leaks Before They Cost You — Meet KeySentry
infosecwriteups.com·2d
🚀Indie Hacking
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·1d
🔓Hacking
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·1d
🎫Kerberos Attacks
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.to·1d·
Discuss: DEV
🎵Spectral Hashing
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.com·1d
🚨Incident Response
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.to·3d·
Discuss: DEV
🔓Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap