Lisa Fagin Davis’ “The Materiality of the Voynich Manuscript”…
ciphermysteries.com·11h
🏰Manuscript Networks
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·1d
🎯Threat Hunting
Compliance of mobile games with loot box probability disclosure law in Korea
sciencedirect.com·2d·
Discuss: Hacker News
⚖️Game Preservation Ethics
More on Carmichael
johndcook.com·2d·
Discuss: Hacker News
🔢Reed-Solomon Math
So What Now?
micro.mu·2h·
Discuss: Hacker News
🧲Magnetic Philosophy
Ever Need to Recover Stolen Crypto Contact Proficient Expert Consultant
news.ycombinator.com·1h·
Discuss: Hacker News
🚨Incident Response
[R] How to retrieve instructions given to annotators - RLHF
reddit.com·1d·
📚Documentation Archaeology
SSH Security: Why You Should Touch to Verify
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
1k LEDs Is No Limit
xayax.net·2d·
Homebrew CPUs
MP who feared her hotel room was bugged by China hits out after spy case collapses
the-independent.com·13h
🕵️Steganographic Archives
How to Reject a Pull Request
github.com·3h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Unsupervised Radio Map Construction in Mixed LoS/NLoS Indoor Environments
arxiv.org·1d
📊Computational Geometry
Utilizing Information Theoretic Approach to Study Cochlear Neural Degeneration
arxiv.org·2d
👂Psychoacoustic Coding
A Function Generator From The Past
hackaday.com·1d
Circuit Archaeology
The A.I. Prompt That Could End the World
nytimes.com·1d·
Proof Automation
Emerging technologies and national security intelligence
tandfonline.com·13h
🔐Capability Systems
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
Man-in-the-Middle Detection
infosecwriteups.com·2d
🎯Threat Hunting