Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology
Maria-Romina Ivan and Sean Jaffe: The saturation number for the diamond is linear
gilkalai.wordpress.comยท15h
The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity
english.elpais.comยท11h
Reverse Engineering a Siemens Programmable Logic Controller for Funs and Vulns (CVE-2024-54089, CVE-2024-54090 & CVE-2025-40757)
trebledj.meยท1d
Quantum Information Supremacy
scottaaronson.blogยท1d
Best infosec-related long reads for the week of 9/6/25
metacurity.comยท3h
Statistical methods in variety testing
cameroncounts.wordpress.comยท23h
Game Programming Patterns
gameprogrammingpatterns.comยท14h
Check if Your Password Has Been Compromised
cubiclenate.comยท24m
Loading...Loading more...