How the CIA’s Kryptos Sculpture Gave Up Its Final Secret
scientificamerican.com·3d
🗝️Paleocryptography
Flag this post
Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·11h
🛡Cybersecurity
Flag this post
CRYPT: synthesiser plugin
vitling.xyz·9h
🎹MIDI Archaeology
Flag this post
#26 Repunit and Residual... History and Etymology of Math Terms
🎯Arithmetic Coding Theory
Flag this post
Cryptographic Algorithms Identification in Java Bytecode
binarly.io·2d
📏Code Metrics
Flag this post
Weekly Update 475
troyhunt.com·18h
🏺Kerberos Archaeology
Flag this post
HigherOrderCO/Bend2
github.com·14h
🔗Functional Compilers
Flag this post
Jehan le Bègue, Giovanni Alcherio, Villela-Petit, quaterni, fascicular culture… and Lisa Fagin Davis.
ciphermysteries.com·1d
🏰Manuscript Networks
Flag this post
The Ancient Greeks Built the World’s First Telegraph System—1,600 Years Before Morse Code
popularmechanics.com·1d
🗝️Paleocryptography
Flag this post
A Probabilistic Computing Approach to the Closest Vector Problem for Lattice-Based Factoring
arxiv.org·3d
🔲Lattice Cryptography
Flag this post
The Age of De-Skilling
theatlantic.com·5h
🌍Cultural Computing
Flag this post
Locking it down: A new technique to prevent LLM jailbreaks
news.sophos.com·2d
🧪Binary Fuzzing
Flag this post
"It’s not about security, it’s about control" – How EU governments want to encrypt their own comms, but break our private chats
techradar.com·1d
🔓Hacking
Flag this post
The Emergence of Cognitive Intelligence (COGINT) as a New Military Intelligence Collection Discipline
tandfonline.com·1d
🧠Intelligence Compression
Flag this post
Ken Thompson Recalls Unix’s Rowdy, Lock-Picking Origins
thenewstack.io·2h
💾vintage computing
Flag this post
Loading...Loading more...