Unlocking Uniqueness: Mastering the Unique Character Algorithm in Go
dev.toยท2hยท
Discuss: DEV
๐ŸŒณTrie Structures
Lowercase leaving you cold? Introducing Retrocide
theregister.comยท2h
๐Ÿ” Terminal Fonts
Language Support for Marginalia Search
marginalia.nuยท18h
๐Ÿ”BitFunnel
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท6h
๐Ÿ”Cryptographic Archaeology
ScribeOCR โ€“ Web interface for recognizing text, OCR, & creating digitized docs
github.comยท7hยท
Discuss: Hacker News
๐Ÿ“„Document Streaming
Introducing OpenZL: An Open Source Format-Aware Compression Framework
engineering.fb.comยท2hยท
Discuss: Hacker News
โšกModern Compression
Why does Japanese have kanji for very large numbers? โ€ข Quick & Tasty
quickandtastycooking.org.ukยท2d
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท1dยท
๐Ÿ”PKI Archaeology
Unicode CLDR 48 Beta available for specification review
blog.unicode.orgยท3d
๐Ÿ”คEBCDIC Unicode
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.comยท1dยท
๐Ÿ—๏ธPaleocryptography
A Global Mining Dataset
tech.marksblogg.comยท7hยท
Discuss: Hacker News
๐Ÿ“ฆMETS Containers
Write in C โ€“ Let it Be
wiki.tcl-lang.orgยท49mยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.comยท1d
๐Ÿ•ต๏ธSteganographic Compression
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.comยท4h
๐Ÿ•ณ๏ธInformation Leakage
What could go wrong when MySQL strict SQL mode is off?
synacktiv.comยท4d
๐ŸงชBinary Fuzzing
FIPS certified vs. FIPS compliant: Whatโ€™s the real difference?
yubico.comยท3h
๐Ÿ”Certificate Analysis
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.comยท4h
๐Ÿ”“Hacking
The Church of Emacs
jxself.orgยท3h
๐ŸงFOSS
How we trained an ML model to detect DLL hijacking
securelist.comยท10h
๐Ÿ”—Binary Similarity