Taking a Look at Compression Algorithms
cefboud.com·1d·
📦Deflate
How Gifshuffle Works
darkside.com.au·5h·
Discuss: Hacker News
🕵️Steganographic Archives
How To Hide Secrets & Exe Payloads In Images (Guide)
dev.to·14h·
Discuss: DEV
🦠Parasitic Archives
Quantum memories reach new milestone with secure quantum money protocol
phys.org·11h
⚛️Quantum Tape
Doing Pixel Work With Modern Languages
bumbershootsoft.wordpress.com·2d
🖼️JPEG XL
Surface Texture and the Complexities of Paper
blogs.loc.gov·14h
📜Document Physics
Basics of Image Forensics: Compression Against AIs
doch88.github.io·2d·
Discuss: Hacker News
🖼️JPEG Forensics
Security review of PHP documentation
blog.quarkslab.com·1d
🛡️WASM Security
GIF Steganography from First Principles (2023)
dtm.uk·1h·
Discuss: Hacker News
🕸️WebP Analysis
Exploring GrapheneOS secure allocator: Hardened Malloc
synacktiv.com·16h
🏷️Memory Tagging
UK Postcode Binary Encoder
github.com·2d·
Discuss: Hacker News
Format Verification
Implicit Communication in Linear Quadratic Gaussian Control Systems
arxiv.org·23h
🧠Machine Learning
How to combine PDF files
engadget.com·1d
📄PDF Internals
Show HN: Python Audio Transcription: Convert Speech to Text Locally
pavlinbg.com·9h·
Discuss: Hacker News
🎙️Whisper
By the power of grey skull!
reddit.com·2h·
Discuss: r/homelab
🛠️Greaseweazle
Protecting data from the public and ourselves
statmodeling.stat.columbia.edu·8h
⚖️Lossy Compression Ethics
Distribution of integer literals in text/speech and source code
shape-of-code.com·1d
🔢Denotational Semantics
Criminals are driving fake cell towers through cities to blast out scam texts
techspot.com·30m
📡Feed Security
Nimbus Manticore Deploys New Malware Targeting Europe
research.checkpoint.com·14h
🎫Kerberos Exploitation