REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐ต๏ธSteganographic Archives
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐ณArchive Merkle Trees
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
๐Homomorphic Encryption
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Hash Functions
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Decompilation
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐ฆ Malware Analysis
Flag this post
De Bruijn Numerals
ฮปLambda Encodings
Flag this post
When do you decide that a storage device hasn't got enough capacity any more?
forums.anandtech.comยท6h
๐ต8-track Revival
Flag this post
Creating a "Two-Face" Rust binary on Linux
synacktiv.comยท3d
๐ฆ Parasitic Archives
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐DNS Security
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท2d
๐Terminal Forensics
Flag this post
AI and the strengthening of records management approaches
thinkingrecords.co.ukยท1d
๐Archive Calculus
Flag this post
IFS Fractal codec
codecs.multimedia.cxยท8h
๐Fractal Compression
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
โกHardware Transactional Memory
Flag this post
The internet was made for privacy
doctorow.medium.comยท3h
๐งฒMagnetic Philosophy
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท3h
๐ด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Flag this post
Show HN: Ellipticc Drive โ open-source cloud drive with E2E and PQ encryption
๐Archive Encryption
Flag this post
Oops, My UUIDs Collided
๐งชBinary Fuzzing
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท3h
๐Hacking
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท1d
๐Binary Similarity
Flag this post
Loading...Loading more...