Degradation-Aware Hierarchical Termination for Blind Quality Enhancement of Compressed Video
arxiv.orgΒ·2d
πŸ“ŠRate-Distortion Theory
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
phys.orgΒ·19h
πŸ—οΈPaleocryptography
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.aiΒ·8hΒ·
Discuss: Hacker News
πŸ“„Text Chunking
Flag this post
Transformer Efficiency Hacks: Leverage the Power of Position
dev.toΒ·10hΒ·
Discuss: DEV
πŸ”„Burrows-Wheeler
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comΒ·1d
🎯NTLM Attacks
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comΒ·1d
πŸ”Cryptographic Archaeology
Flag this post
MPEG-2 DCT Recompression FAQ (2003)
forum.doom9.orgΒ·3dΒ·
Discuss: Hacker News
βœ…Verification Codecs
Flag this post
Explainer: Data and metadata
eclecticlight.coΒ·21h
🏷️Metadata Standards
Flag this post
Lang’s theorem β€” Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comΒ·9h
Ξ»Lambda Encodings
Flag this post
Hole-in-the-wall homelab.
reddit.comΒ·13hΒ·
Discuss: r/homelab
🏠Homelab Preservation
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.deΒ·2d
πŸ’£ZIP Vulnerabilities
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.comΒ·11hΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Flag this post
Source code for a 1977 version of Zork
github.comΒ·1dΒ·
Discuss: Lobsters
πŸ—ƒοΈROM Preservation
Flag this post
A Content-Preserving Secure Linguistic Steganography
arxiv.orgΒ·5d
πŸ•΅οΈSteganographic Archives
Flag this post
ProPetro - Standing Out From Frac Peers With Power
seekingalpha.comΒ·1d
πŸ”BitFunnel
Flag this post
[solved] backing up the entire home-folder of my notebook: methods & procedures on command line: rsync, tar... etx:
forums.anandtech.comΒ·2d
πŸ’ΏBackup Strategies
Flag this post
Show HN: Hirosend – Simple Encrypted File Sharing
hirosend.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
nytimes.comΒ·1dΒ·
πŸ”Archive Cryptanalysis
Flag this post
Enshitification
feld.comΒ·1d
🧲Magnetic Philosophy
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comΒ·12h
πŸ“ΌCassette Hacking
Flag this post