The Why of PGP Authentication
articles.59.caΒ·6h
πŸ”‘Cryptographic Protocols
The Nordic Journalism Students Project: 20 Years of Charting Ideals in Flux
nordmedianetwork.orgΒ·1d
πŸ›οΈNordic Archives
Sorting encrypted data without decryption: a practical trick
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”Hash Functions
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devΒ·1dΒ·
Discuss: Hacker News
πŸ”Hash Functions
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comΒ·6h
πŸ›‘Cybersecurity
Digital transformation of intelligence in Denmark. An interview with Anja Dalgaard-Nilsen
tandfonline.comΒ·1d
πŸ”Swedish Cryptography
Stable ferroaxial states offer a new type of light-controlled non-volatile memory
phys.orgΒ·2h
βš›οΈQuantum Tape
EU ministers meet to discuss future online child protection moves
euobserver.comΒ·6h
πŸ”Swedish Cryptography
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comΒ·9h
πŸ’ŽInformation Crystallography
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comΒ·9h
πŸ”—Hash Chains
Is the End of Detection-Based Security Here?
thenewstack.ioΒ·3h
🎯Threat Hunting
A national recognition; but science and open source are bitter victories
gael-varoquaux.infoΒ·21h
🐧FOSS
Three ways formally verified code can go wrong in practice
buttondown.comΒ·2h
πŸ“œProof Carrying Code
October 10, 2025: Bellingcat Online Workshop on RuNet Investigations (4-hour) [Americas / Europe-friendly time]
bellingcat.comΒ·19h
πŸ”Polish Cryptanalysis
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.comΒ·3d
πŸ”Quantum Security
The Day I Hacked XCTrack
blog.syrac.orgΒ·4hΒ·
Discuss: Hacker News
πŸ”PKI Archaeology
A Deal with the Devil? Free VPNs still widespread across the UK
techradar.comΒ·6h
πŸ›£οΈBGP Hijacking
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.orgΒ·15h
πŸ•΅οΈVector Smuggling
Umwelt
en.wikipedia.orgΒ·17h
βš™οΈsystems theory