Variational Secret Common Randomness Extraction
arxiv.org·17h
🧮Kolmogorov Complexity
CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·1d
🎫Kerberos Attacks
My Life in Ambigrammia
theatlantic.com·3h·
Discuss: Hacker News
📐Mathematical Art
Expert: Europe should wage information warfare inside Russia
sverigesradio.se·9h
🔍Polish Cryptanalysis
The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.com·16h
⚔️Lean Theorem
Museum of Living in Communism in Brașov, Romania
atlasobscura.com·8h
⚗️Soviet Computers
Digital ID – The New Chains of Capitalist Surveillance
theslowburningfuse.wordpress.com·17h·
Discuss: Hacker News
🔐Capability Systems
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·21h
🔧Binary Parsers
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·1d
🔐Quantum Security
When Nova introduced hacking to the mainstream
dfarq.homeip.net·10h
🔓Hacking
Numeric Pager Code Encoder Tool (Look Alike Cipher)
fcsuper.blogspot.com·1d·
🔤Character Encoding
Equality Without Feminism?
nybooks.com·1d
⚗️Soviet Computers
What Makes a Language Look Like Itself?
towardsdatascience.com·1d
🔤Character Classification
eSIM Best Practices for iPhone & iPad: Setting the Gold Standard in Mobile Security for 2025 and Beyond
jamf.com·1d
🔐HSM Integration
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.com·1d
🌳Archive Merkle Trees
Pre-Dreadnaughts: an aesthetic appreciation
scottlocklin.wordpress.com·8h
🕯️Wax Cylinders
Group Theory Day in Budapest
cameroncounts.wordpress.com·1d
🔀Category Theory
A gentle introduction to GEMM using MMA tensor cores
am17an.bearblog.dev·1d·
Discuss: Hacker News
📊RISC-V Vectors