Variational Secret Common Randomness Extraction
arxiv.org·1d
🧮Kolmogorov Complexity
CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·1d
🎫Kerberos Attacks
My Life in Ambigrammia
theatlantic.com·10h·
Discuss: Hacker News
📐Mathematical Art
Expert: Europe should wage information warfare inside Russia
sverigesradio.se·16h
🔍Polish Cryptanalysis
The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.com·23h
⚔️Lean Theorem
Museum of Living in Communism in Brașov, Romania
atlasobscura.com·15h
⚗️Soviet Computers
Digital ID – The New Chains of Capitalist Surveillance
theslowburningfuse.wordpress.com·1d·
Discuss: Hacker News
🔐Capability Systems
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·1d
🔧Binary Parsers
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·1d
🔐Quantum Security
When Nova introduced hacking to the mainstream
dfarq.homeip.net·17h
🔓Hacking
Numeric Pager Code Encoder Tool (Look Alike Cipher)
fcsuper.blogspot.com·2d·
🔤Character Encoding
Equality Without Feminism?
nybooks.com·1d
⚗️Soviet Computers
What Makes a Language Look Like Itself?
towardsdatascience.com·1d
🔤Character Classification
eSIM Best Practices for iPhone & iPad: Setting the Gold Standard in Mobile Security for 2025 and Beyond
jamf.com·2d
🔐HSM Integration
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.com·1d
🌳Archive Merkle Trees
Group Theory Day in Budapest
cameroncounts.wordpress.com·1d
🔀Category Theory
RacketCon (fifteenth) October 4-5, 2025
con.racket-lang.org·4h·
Discuss: Hacker News
🔤Type Theory
Wanted: CIT-102 keyboard
twostopbits.com·5h
📺VT100