Why Your Password Storage is Fine, But Your File Checksum is Obsolete
dev.to·2d·
Discuss: DEV
Archive Checksums
The Why of PGP Authentication
articles.59.ca·6h
🔑Cryptographic Protocols
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·19h·
Discuss: Hacker News
🔢Reed-Solomon Math
Mastering Zod Validation Mastering Data Validation and Error Handling in TypeScript with Zod
blog.codeminer42.com·2d
Format Validation
Three ways formally verified code can go wrong in practice
buttondown.com·2h
📜Proof Carrying Code
Sorting encrypted data without decryption: a practical trick
dev.to·4h·
Discuss: DEV
🔐Hash Functions
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ing·11h
🏺ZIP Archaeology
Phishing Protection: Tools SOC Teams Trust in 2025 – An Ultimate Guide
vmray.com·2d
🎯Threat Hunting
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
APRS over LoRa with RNode | unsigned.io
unsigned.io·8h
📻Homebrew Protocols
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🔐PKI Archaeology
Building a Trusted Internet Starts with Hosting Providers
circleid.com·2d
🏠Homelab Federation
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
Your passwords don’t need so many fiddly characters, NIST says
malwarebytes.com·4h
🔓Password Cracking
Business Logic Error - Bypassing Payment with Test Cards
infosecwriteups.com·8h
🧪Binary Fuzzing
7-Zip: Information on closed security gaps available
heise.de·8h
💣ZIP Vulnerabilities
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing