The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท2dยท
๐Ÿ“กDNS Archaeology
NFTs, Certificates, Blockchain and Artificial Intelligence : The New Tools of Authenticating Art
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Blockchain Archives
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท8h
๐Ÿ”ขReed-Solomon Math
Crimson Collective: A New Threat Group Observed Operating in the Cloud
rapid7.comยท1h
๐ŸŽซKerberos Exploitation
Forensic Video Workflow with Amped FIVE โ€“ Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.comยท6h
โš–๏ธDigital Evidence
FIPS certified vs. FIPS compliant: Whatโ€™s the real difference?
yubico.comยท1d
๐Ÿ”Certificate Analysis
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.comยท22h
๐Ÿ”Quantum Security
Ancient teeth provide new insight into the lives of the world's first farming villagers
phys.orgยท7h
๐ŸฆดDatabase Paleontology
How a top bug bounty researcher got their start in security
github.blogยท4h
๐Ÿ”“Hacking
Call for Applications: Publications Editor
www2.archivists.orgยท6h
๐Ÿ—ƒarchives
The 47-Day Certificate Ultimatum: How Browsers Broke the CA Cartel
certkit.ioยท1dยท
Discuss: DEV, Hacker News
๐Ÿ”Certificate Analysis
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท1d
๐Ÿ”Cryptographic Archaeology
Bond-Centered Molecular Fingerprint Derivatives: A BBBP Dataset Study
arxiv.orgยท16h
๐Ÿ”Vector Forensics
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.comยท10h
๐Ÿ”“Decompilation
LockBit Breach: Insights From a Ransomware Groupโ€™s Internal Data
blog.compass-security.comยท13h
๐ŸŽซKerberos Attacks
AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest
aws.amazon.comยท1d
๐Ÿ”HSM Integration
Building Apache Phoenix DynamoDB Compatibility: Zero-Code Multi-Cloud Database Migrations at Scale
engineering.salesforce.comยท6h
๐Ÿ’ฟZFS Archaeology
Authentication (sorry, no whitepaper for you)
medium.comยท3hยท
Discuss: Hacker News
๐Ÿ”คEBCDIC Privacy
MOSIP, A National Digital Identity Software Solution
ciamweekly.substack.comยท1dยท
Discuss: Substack
๐Ÿ“กDNS Archaeology
The ReD Hat Consulting Breach โ€“ An Analysis
digitalforensicsmagazine.comยท10h
๐Ÿ”“Hacking