The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.comยท18hยท
๐Ÿ”Cryptographic Archaeology
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท17hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
# 8 Apothem ...History and Etymology of Math Terms
pballew.blogspot.comยท2hยท
๐Ÿ“šArchive Mathematics
A Man Spent 6 Years Searching the Same Farmโ€”and Finally Discovered a 1,900-Year-Old Roman Treasure
popularmechanics.comยท20h
๐ŸบKerberos Archaeology
Using Information Entropy To Make Choices / Choose Experiments
blog.demofox.orgยท5h
๐Ÿ”ฒCellular Automata
Sand-Sized Stones Unlock the Secret History of Earthโ€™s First Life
scitechdaily.comยท1d
๐ŸฆดDatabase Paleontology
Exterro Launches FTK Imager Pro, Unlocking Faster Access To Encrypted Evidence For Investigators Worldwide
forensicfocus.comยท14m
๐Ÿ’ฟDAT Forensics
Why does Japanese have kanji for very large numbers? โ€ข Quick & Tasty
quickandtastycooking.org.ukยท2d
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Reading the ENISA Threat Landscape 2025 report
securityaffairs.comยท2h
๐ŸŽฏThreat Hunting
Automated Artifact Detection & Classification in Microscopy Image Datasets
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„Document Digitization
Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.comยท9hยท
Discuss: Hacker News
๐Ÿ“Mathematical Art
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.meยท3d
๐Ÿ”งBinary Parsers
Monumental rock art: humans thrived in Arab. Desert during Pleistocene-Holocene
nature.comยท1dยท
Discuss: Hacker News
๐Ÿ“ธTIFF Archaeology
How we trained an ML model to detect DLL hijacking
securelist.comยท57m
๐Ÿ”—Binary Similarity
Ryan Baker
deprogrammaticaipsum.comยท5h
๐ŸงฒMagnetic Domains
Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท1dยท
๐Ÿ“ŠHyperLogLog
Bematist (Professional "Step Measurer")
en.wikipedia.orgยท18hยท
Discuss: Hacker News
๐ŸบComputational Archaeology
Detecting Notational Errors in Digital Music Scores
arxiv.orgยท4h
๐ŸŽผComputational Musicology