The Day I Hacked XCTrack
blog.syrac.orgยท12hยท
Discuss: Hacker News
๐Ÿ“ผCassette Hacking
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท17h
๐Ÿ”—Hash Chains
My BTL1 Review
infosecwriteups.comยท16h
๐Ÿ”Certificate Analysis
The Why of PGP Authentication
articles.59.caยท14h
๐Ÿ”‘Cryptographic Protocols
Building Trust for AI Agents โ€” ISM-X: A Privacy-Preserving Identity Layer (with demo)
dev.toยท8hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Creating Real-Time Multimodal AI Pipelines: Scaling File Processing to 50M Daily Uploads
engineering.salesforce.comยท3h
๐ŸŒŠStream Processing
How to configure and verify ACM certificates with trust stores
aws.amazon.comยท2d
๐Ÿ”Certificate Analysis
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.comยท6h
๐ŸŽซKerberos Attacks
SSH Security: Why You Should Touch to Verify
ubicloud.comยท19hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท14h
๐Ÿ›๏ธPREMIS Metadata
Archaeologists Found a 2,500-Year-Old Tomb Filled with Treasureโ€”and Completely Untouched
popularmechanics.comยท13h
๐Ÿ—๏ธPaleocryptography
Paper Highlights - Do Password Managers Improve Password Hygiene?
blog.passwordresearch.comยท1hยท
๐Ÿ”“Password Cracking
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท16h
๐ŸšจIncident Response
Building a Trusted Internet Starts with Hosting Providers
circleid.comยท2d
๐Ÿ Homelab Federation
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท15h
๐Ÿ”“Hacking
The Rise of the Knowledge Sculptor: A New Archetype for Knowledge Work in the Age of Generative AI
arxiv.orgยท23h
๐Ÿ—บ๏ธCompetency Maps
The silent impersonators: how lookalike domains threaten UK business trust
techradar.comยท12h
๐ŸŒDNS Security
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท14h
๐Ÿ›กCybersecurity
Tired of Passwords? Meet Passkeys: Your Keychain to a Passwordless Future
dev.toยท16hยท
Discuss: DEV
๐Ÿ”“Password Cracking
Three ways formally verified code can go wrong in practice
buttondown.comยท10h
๐Ÿ“œProof Carrying Code