Sorting encrypted data without decryption: a practical trick
dev.toยท4hยท
Discuss: DEV
๐Ÿ”Hash Functions
Show HN: Sora Watermark Remover
sorawatermark.liveยท2hยท
Discuss: Hacker News
๐ŸŽž๏ธMKV Forensics
The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Covert Quantum Learning: Privately and Verifiably Learning from Quantum Data
arxiv.orgยท1d
๐Ÿ”Quantum Cryptography
Study Finds Over 77% of Mobile Apps Leak Sensitive Data and Pose Privacy Risks
zimperium.comยท6h
๐Ÿ›กCybersecurity
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.comยท1d
๐Ÿ–ผ๏ธJPEG XL
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท6h
๐Ÿ›กCybersecurity
Michael Kohn - tin can phone modem
mikekohn.netยท2h
๐ŸงชCassette Hacks
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท7h
๐Ÿ Homelab Federation
Metasploit Wrap Up 10/09/2025
rapid7.comยท23h
๐Ÿ›ก๏ธeBPF Security
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
securityaffairs.comยท23h
๐Ÿ•ต๏ธVector Smuggling
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Stable ferroaxial states offer a new type of light-controlled non-volatile memory
phys.orgยท2h
โš›๏ธQuantum Tape
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.orgยท4h
๐Ÿ”“Hacking
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท7h
๐Ÿ”“Hacking
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.comยท13h
๐Ÿ“ผTape Simulation
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ingยท11h
๐ŸบZIP Archaeology
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols