The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.aiΒ·4hΒ·
Discuss: Hacker News
πŸ”PKI Archaeology
This Nordic Community Could Be the Next Longevity Blue Zone
scitechdaily.comΒ·3h
πŸ‡ΈπŸ‡ͺNordic Algorithms
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.comΒ·8h
πŸ›‘Cybersecurity
Hyper-Personalized Customer Journey Orchestration via Probabilistic Temporal Logic Modeling in CRM
dev.toΒ·12hΒ·
Discuss: DEV
πŸŽ›οΈFeed Filtering
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.comΒ·5hΒ·
πŸ—οΈPaleocryptography
Expert: Europe should wage information warfare inside Russia
sverigesradio.seΒ·2d
πŸ”Polish Cryptanalysis
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.comΒ·12h
πŸ•΅οΈSteganographic Compression
ELA-1534-1 freeipa security update
freexian.comΒ·9h
🎫Kerberos Exploitation
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comΒ·44mΒ·
Discuss: Hacker News
πŸ›‘οΈWASM Security
Public Key Infrastructure with Secure Shell
free-pmx.orgΒ·18hΒ·
Discuss: r/homelab
🎯NTLM Attacks
Russia’s Hybrid War Against NATO Ramping Up: Danish Intelligence
twz.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Polish Cryptanalysis
Two thought experiments
surfingcomplexity.blogΒ·14h
πŸ‘οΈSystem Observability
Satellite Warfare – An Analysis
digitalforensicsmagazine.comΒ·1d
🎯Threat Hunting
A History of Active Directory Security
adsecurity.orgΒ·1d
🏺Kerberos Archaeology
Footnotes to a couple of weeks: Category mistakes, Dutch courtyards, MartinΕ―
logicmatters.netΒ·1d
πŸ”€Category Theory
Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure
wired.comΒ·1d
πŸ›‘Cybersecurity
The weak link: the case for soft skills in the intelligence analysis profession
tandfonline.comΒ·2d
πŸ•΅Intelligence
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.comΒ·2d
🌳Archive Merkle Trees
Stripped of Myths
nybooks.comΒ·3d
❄️Nordic Design Philosophy