Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology
Japanese spy gear and special weapons: How Noborito’s scientists and technicians served in the Second World War and the Cold War
tandfonline.com·11h
CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·1d
Expert: Europe should wage information warfare inside Russia
sverigesradio.se·9h
The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.com·16h
Museum of Living in Communism in Brașov, Romania
atlasobscura.com·8h
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·1d
When Nova introduced hacking to the mainstream
dfarq.homeip.net·10h
Equality Without Feminism?
nybooks.com·1d
What Makes a Language Look Like Itself?
towardsdatascience.com·1d
Pre-Dreadnaughts: an aesthetic appreciation
scottlocklin.wordpress.com·8h
Group Theory Day in Budapest
cameroncounts.wordpress.com·1d
Loading...Loading more...