Eastern Bloc Security, Cold War Encryption, GOST Standards, Cultural Cryptology
After serving as bulwark for 80 years, Japan's U.S. ties continue to evolve
japantimes.co.jp·14h
Lomas, Daniel - The secret history of UK security vetting from 1909 to the present / Daniel W. B. Lomas.
libris.kb.se·3d
The Kepler Problem (Part 11)
johncarlosbaez.wordpress.com·4d
Speed kills: AI coding tools revive old-school hacks
reversinglabs.com·23h
It's high time the Studio Display joined the mini-LED party, and rumors suggest Apple could use the tech in its next monitor for creative pros
techradar.com·47m
Hackers leak North Korean group’s data
the-independent.com·1d
Newly released letters offer glimpse into lives of WWII codebreakers
the-independent.com·2d
AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders
arxiv.org·1d
Training Kindai OCR with parallel textline images and self-attention feature distance-based loss
arxiv.org·1d
CodeSOD: Raise VibeError
thedailywtf.com·1d
Loading...Loading more...