Merkle Trees, Blockchain Fundamentals, Integrity Verification, Tamper Detection

Feeds to Scour
SubscribedAll
Research Worth Reading Week 49/2025
pentesterlab.com·34m
🔐Archive Cryptanalysis
Preview
Report Post
Mapping the Tor darkmarket ecosystem: A network analysis of topics, communication channels, and languages
sciencedirect.com·11h
🧅Tor Networks
Preview
Report Post
What is a Pedersen commitment?
johndcook.com·1d
🔐Quantum Security
Preview
Report Post
Securing Rails Applications
guides.rubyonrails.org·2h·
Discuss: Hacker News
🛡️WASM Security
Preview
Report Post
HIRE A GENUINE CRYPTO RECOVERY SERVICE, LEGIT COMPANY FOR RECOVERY OF STOLEN ETHEREUM / BITCOIN__ TECHY FORCE CYBER RETRIEVAL
dev.to·1h·
Discuss: DEV
🔐Certificate Analysis
Preview
Report Post
Linux 6.19 Introduces PCIe Link Encryption & Device Authentication, AMD SEV-TIO Enabling
phoronix.com·5h
🔒Secure Boot
Preview
Report Post
Inside Shanya, a packer-as-a-service fueling modern attacks
news.sophos.com·20h
🏺ZIP Archaeology
Preview
Report Post
Cryptanalysis of Gleeok-128
arxiv.org·2d
🌊Stream Ciphers
Preview
Report Post
Notes on Distributed Systems for Young Bloods (2013)
somethingsimilar.com·1d·
Discuss: Hacker News
🤝Distributed Consensus
Preview
Report Post
The Quest to Replace Passwords: a comparative evaluation of Web authn schemes
cl.cam.ac.uk·6h·
Discuss: Hacker News
🔐PKI Archaeology
Preview
Report Post
Monoidal Hashing for Data Deduplication
scannedinavian.com·3d·
Discuss: Hacker News
🔄Content Deduplication
Preview
Report Post
Breadboards that are set up on my desk right now
circusscientist.com·8h
⚙️Tape Mechanics
Preview
Report Post
Cryptography for the Everyday Developer: Understanding RSA
sookocheff.com·2d
🔐Homomorphic Encryption
Preview
Report Post
React2Shell Exploitation: A Short Summary of Honeypot Activity
defusedcyber.com·4h·
Discuss: Hacker News
🎫Kerberos Exploitation
Preview
Report Post
You Gotta Push If You Wanna Pull
morling.dev·14h
🗄️Database Internals
Preview
Report Post
A series of tricks and techniques I learned doing tiny GLSL demos
blog.pkh.me·5h
📟Terminal Physics
Preview
Report Post
Building a K8s Multi-Cluster Router for Fun
reddit.com·9h·
Discuss: r/kubernetes
🏠Homelab Orchestration
Preview
Report Post
Formalization of Erdős problems
xenaproject.wordpress.com·2d
🎯Performance Proofs
Preview
Report Post
"The Step-by-Step Process I Experienced with Scanner Hacker Crypto Recovery"
scannerhacktech.com·1d·
Discuss: Hacker News
🏺Kerberos Archaeology
Preview
Report Post
Meta-Optimized Continual Adaptation for coastal climate resilience planning with zero-trust governance guarantees
dev.to·1h·
Discuss: DEV
Incremental Computation
Preview
Report Post