🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🗝️ Paleocryptography

Historical Ciphers, Medieval Encryption, Manuscript Analysis, Archaeological Cryptanalysis

I Figured Out What the Voynich Manuscript Says; It's Something More Than Words
dmerullo.substack.com·10h·
Discuss: Substack
🏰Manuscript Networks
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Volcanoes May Be Spewing Gold From Earth’s Molten Heart
scitechdaily.com·2h
🏺Kerberos Archaeology
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·6h
🎯Threat Hunting
Ancient mammoth-tusk boomerang is twice as old as we thought
newscientist.com·5h
🦴Database Paleontology
Digital Forensics Round-Up, June 25 2025
forensicfocus.com·10h
🔬Archive Forensics
Encrypting identifiers in practice
sjoerdlangkemper.nl·19h
🌊Stream Ciphers
Archaeologists Found a Mysterious Secret Chamber Beneath a 12th-Century Castle
popularmechanics.com·12h
🔐Cryptographic Archaeology
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·1d
🔗Data Provenance
Single-molecule magnet could lead to stamp-sized hard drives capable of storing 100 times more data
phys.org·9h
⚛️Quantum Tape
Bergh, Stefan, - Landscape of the monuments : a study of the passage tombs in the Cúil Irra region / Stefan Bergh.
libris.kb.se·1d
🔶Voronoi Diagrams
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·12h
🦠Malware Analysis
Linguistics vs. archeology and (physical) anthropology
languagelog.ldc.upenn.edu·1d
📡Frequency Archaeology
How to Prove That An Email Was Received
metaspike.com·5h
📄Document Digitization
Family recipe
nature.com·11h
🧮Algorithmic Cooking
Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·2d
🌳Archive Merkle Trees
Mining and Refining: Drilling and Blasting
hackaday.com·1d
🔍Tape Forensics
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·15h
🎫Kerberos Attacks
40,000-year-old mammoth tusk boomerang is oldest in Europe — and possibly the world
livescience.com·6h·
Discuss: Hacker News
🦴Database Paleontology
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·2d
🔓Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap