Sorting encrypted data without decryption: a practical trick
dev.toยท14hยท
Discuss: DEV
๐Ÿ”Hash Functions
Show HN: Sora Watermark Remover
sorawatermark.liveยท13hยท
Discuss: Hacker News
๐ŸŽž๏ธMKV Forensics
The Day I Hacked XCTrack
blog.syrac.orgยท14hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Covert Quantum Learning: Privately and Verifiably Learning from Quantum Data
arxiv.orgยท2d
๐Ÿ”Quantum Cryptography
UNREDACTED Magazine Issue 009
inteltechniques.comยท6h
๐Ÿ“กRSS Readers
Study Finds Over 77% of Mobile Apps Leak Sensitive Data and Pose Privacy Risks
zimperium.comยท16h
๐Ÿ›กCybersecurity
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท16h
๐Ÿ›กCybersecurity
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.comยท2d
๐Ÿ–ผ๏ธJPEG XL
Michael Kohn - tin can phone modem
mikekohn.netยท12h
๐ŸงชCassette Hacks
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท17h
๐Ÿ Homelab Federation
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
securityaffairs.comยท1d
๐Ÿ•ต๏ธVector Smuggling
A gentle introduction to Generative AI: Historical perspective
medium.comยท4hยท
Discuss: Hacker News
๐Ÿง Learned Codecs
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Stable ferroaxial states offer a new type of light-controlled non-volatile memory
phys.orgยท12h
โš›๏ธQuantum Tape
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.orgยท14h
๐Ÿ”“Hacking
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท17h
๐Ÿ”“Hacking
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ingยท21h
๐ŸบZIP Archaeology