REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
Why wavelets is a bad choice for image coding
codecs.multimedia.cxยท1d
๐Ÿ“ŠRate-Distortion Theory
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toยท10hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Flag this post
When do you decide that a storage device hasn't got enough capacity any more?
forums.anandtech.comยท6h
๐ŸŽต8-track Revival
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
De Bruijn Numerals
text.marvinborner.deยท1dยท
Discuss: Hacker News
ฮปLambda Encodings
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท3h
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Flag this post
The internet was made for privacy
doctorow.medium.comยท3h
๐ŸงฒMagnetic Philosophy
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.comยท4h
๐Ÿ“„Document Digitization
Flag this post
Video Encoding 101: A Comprehensive Guide
imagekit.ioยท1dยท
Discuss: Hacker News
๐ŸŽฅStreaming Codecs
Flag this post
AI scrapers request commented scripts
cryptography.dogยท4hยท
Discuss: Hacker News
๐ŸŒDNS Security
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท2d
๐Ÿ“ŸTerminal Forensics
Flag this post
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
securityaffairs.comยท9h
๐Ÿ›กCybersecurity
Flag this post
What's In My Human Feedback? Learning Interpretable Descriptions of Preference Data
arxiv.orgยท16h
๐ŸŽ›๏ธFeed Filtering
Flag this post
Phase diagram map of ferroelectric properties unlocked with AI in seconds
phys.orgยท3h
๐Ÿ’ŽInformation Crystallography
Flag this post
Notes from RIPE 91
blog.apnic.netยท21h
๐ŸŒDNS over QUIC
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท1d
๐Ÿ”—Binary Similarity
Flag this post