Degradation-Aware Hierarchical Termination for Blind Quality Enhancement of Compressed Video
arxiv.orgΒ·2d
πŸ“ŠRate-Distortion Theory
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
phys.orgΒ·20h
πŸ—οΈPaleocryptography
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.aiΒ·9hΒ·
Discuss: Hacker News
πŸ“„Text Chunking
Flag this post
Transformer Efficiency Hacks: Leverage the Power of Position
dev.toΒ·12hΒ·
Discuss: DEV
πŸ”„Burrows-Wheeler
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comΒ·1d
🎯NTLM Attacks
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comΒ·1d
πŸ”Cryptographic Archaeology
Flag this post
MPEG-2 DCT Recompression FAQ (2003)
forum.doom9.orgΒ·3dΒ·
Discuss: Hacker News
βœ…Verification Codecs
Flag this post
Explainer: Data and metadata
eclecticlight.coΒ·23h
🏷️Metadata Standards
Flag this post
Lang’s theorem β€” Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comΒ·10h
Ξ»Lambda Encodings
Flag this post
Hole-in-the-wall homelab.
reddit.comΒ·14hΒ·
Discuss: r/homelab
🏠Homelab Preservation
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.deΒ·2d
πŸ’£ZIP Vulnerabilities
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.comΒ·12hΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Flag this post
Source code for a 1977 version of Zork
github.comΒ·1dΒ·
Discuss: Lobsters
πŸ—ƒοΈROM Preservation
Flag this post
ProPetro - Standing Out From Frac Peers With Power
seekingalpha.comΒ·1d
πŸ”BitFunnel
Flag this post
A Content-Preserving Secure Linguistic Steganography
arxiv.orgΒ·5d
πŸ•΅οΈSteganographic Archives
Flag this post
[solved] backing up the entire home-folder of my notebook: methods & procedures on command line: rsync, tar... etx:
forums.anandtech.comΒ·2d
πŸ’ΏBackup Strategies
Flag this post
Show HN: Hirosend – Simple Encrypted File Sharing
hirosend.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
nytimes.comΒ·1dΒ·
πŸ”Archive Cryptanalysis
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comΒ·13h
πŸ“ΌCassette Hacking
Flag this post
The why of Lisa G. U. I.
blog.yaros.aeΒ·2d
πŸ“ŸTerminal Typography
Flag this post