Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology
Japanese spy gear and special weapons: How Noborito’s scientists and technicians served in the Second World War and the Cold War
tandfonline.com·18h
CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·1d
Expert: Europe should wage information warfare inside Russia
sverigesradio.se·16h
The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.com·23h
Museum of Living in Communism in Brașov, Romania
atlasobscura.com·15h
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·1d
When Nova introduced hacking to the mainstream
dfarq.homeip.net·17h
Equality Without Feminism?
nybooks.com·1d
What Makes a Language Look Like Itself?
towardsdatascience.com·1d
Group Theory Day in Budapest
cameroncounts.wordpress.com·1d
Wanted: CIT-102 keyboard
twostopbits.com·5h
Loading...Loading more...