No Key, Mo Problems
bfswa.substack.comΒ·1dΒ·
Discuss: Substack
πŸ”—Hash Chains
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgΒ·1d
🎭Cultural Informatics
Flag this post
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”„Archival Workflows
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comΒ·1d
🏠Homelab Security
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.comΒ·1d
🚨Incident Response
Flag this post
Lang’s theorem β€” Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comΒ·10h
Ξ»Lambda Encodings
Flag this post
Cypherpunks Hall of Fame
github.comΒ·3dΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meΒ·2d
πŸ”Archive Encryption
Flag this post
Weekly Update 479
troyhunt.comΒ·2h
πŸ”’Privacy Archives
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
phys.orgΒ·20h
πŸ—οΈPaleocryptography
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.ioΒ·1d
πŸ—„οΈPostgreSQL WAL
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.aiΒ·9hΒ·
Discuss: Hacker News
πŸ“„Text Chunking
Flag this post
Python Certifi and Custom CAs
zufallsheld.deΒ·14hΒ·
Discuss: Hacker News
πŸ§ͺCBOR Fuzzing
Flag this post
Why GRC Programs Fail Without Continuous Cyber Risk Intelligence
securityscorecard.comΒ·1d
πŸ•΅οΈPenetration Testing
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movΒ·10hΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.comΒ·1d
πŸ“œFamily History Data
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.orgΒ·2d
🏺Format Archaeology
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
reddit.comΒ·1dΒ·
Discuss: r/golang
🎫Kerberos History
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
nytimes.comΒ·1dΒ·
πŸ”Archive Cryptanalysis
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comΒ·1d
🎯NTLM Attacks
Flag this post