The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·5h·
Discuss: Hacker News
🔐PKI Archaeology
This Nordic Community Could Be the Next Longevity Blue Zone
scitechdaily.com·5h
🇸🇪Nordic Algorithms
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.com·14h
🕵️Steganographic Compression
The Password is Dead. Long Live the Password? A Look at FIDO2, Passkeys, and the Post-SMS Future
dev.to·10h·
Discuss: DEV
🔐Quantum Security
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.com·6h·
🗝️Paleocryptography
Plugin Secure
rya.nc·1d·
Discuss: Hacker News
Checksum Validation
sopass and cross-device syncing in a password manager
blog.liw.fi·1d
🔀CRDT
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·9h
🛡Cybersecurity
3 years of DSA: researchers launch "mass enquiry" on Facebook, X & Co.
heise.de·1h
⚖️Legal Compliance
Dimensional Analysis in Programming Languages (2018)
gmpreussner.com·2h·
Discuss: Hacker News
🧮Algebraic Datatypes
Public Key Infrastructure with Secure Shell
free-pmx.org·20h·
Discuss: r/homelab
🎯NTLM Attacks
Keeping cash across Europe: Which countries use the most?
euronews.com·21h
🗃️Punched Cards
AKF: A modern synthesis framework for building datasets in digital forensics
sciencedirect.com·1d
🔍FLAC Forensics
The Mystery of How Quasicrystals Form
wired.com·10h
📐Mathematical Art
ELA-1534-1 freeipa security update
freexian.com·11h
🎫Kerberos Exploitation
Tinfoil Chat – Onion-routed, endpoint secure messaging system
github.com·1d·
Discuss: Hacker News
🌊Stream Ciphers
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·2h·
Discuss: Hacker News
🛡️WASM Security
News for September 2025
ptreview.sublinear.info·1d
🧪Property-Based Testing
What Makes a Language Look Like Itself?
towardsdatascience.com·3d
🔤Character Classification
Swedes stock up on food as fears of war deepen
thelocal.se·1d
🇸Sweden