Things to look forward to
markjgsmith.comยท1d
๐ฏContent Recommendation
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ญCultural Informatics
Flag this post
The AI Security Playbook: Match Your Testing to Your Maturity
hackerone.comยท2d
๐Capability Systems
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.comยท1d
๐คEBCDIC Privacy
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
๐ง
Tor Networks
Flag this post
Mad drunk on the mead of poetry
blog.zarfhome.comยท1d
๐งชCBOR Fuzzing
Flag this post
Attackers Can Use Poetry To Derail AI Safeguards
forbes.comยท2d
๐ฅ๏ธModern Terminals
Flag this post
HashiCorp Vault is overhyped, and Mozilla SOPS with KMS and Git is underrated
๐Archive Encryption
Flag this post
AI-Powered Espionage Will Favor China
news.risky.bizยท3d
๐Hacking
Flag this post
Cypherpunks Hall of Fame
๐Cryptographic Archaeology
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
๐ Personal Archives
Flag this post
The Evolving Ethics of Medical Data Stewardship
arxiv.orgยท2d
โ๏ธArchive Ethics
Flag this post
Cryptographers Cancel Election Results After Losing Decryption Key
it.slashdot.orgยท1d
๐Quantum Cryptography
Flag this post
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
aws.amazon.comยท1d
๐ณArchive Merkle Trees
Flag this post
Moving Away from Google
๐ Personal Archives
Flag this post
Loading...Loading more...