The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
Explainer: Data and metadata
eclecticlight.co·21h
🏷️Metadata Standards
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
phys.org·19h
🗝️Paleocryptography
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
The Small Capacity Memory Card Championship (Japan) results are in — a 0.5MB SmartMedia card won, but a 2KB Casio battery-backed RAM card lost due to a technica...
tomshardware.com·18h
🕹️Retro Gaming
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Press a button and this SSD will self-destruct with all your data
theverge.com·1d
💿WORM Storage
Flag this post
A Content-Preserving Secure Linguistic Steganography
arxiv.org·5d
🕵️Steganographic Archives
Flag this post
[solved] backing up the entire home-folder of my notebook: methods & procedures on command line: rsync, tar... etx:
forums.anandtech.com·2d
💿Backup Strategies
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
🔐Archive Cryptanalysis
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Source code for a 1977 version of Zork
🗃️ROM Preservation
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
Hole-in-the-wall homelab.
🏠Homelab Preservation
Flag this post
Loading...Loading more...