The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.aiΒ·1hΒ·
Discuss: Hacker News
πŸ”PKI Archaeology
This Nordic Community Could Be the Next Longevity Blue Zone
scitechdaily.comΒ·35m
πŸ‡ΈπŸ‡ͺNordic Algorithms
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.comΒ·5h
πŸ›‘Cybersecurity
Hyper-Personalized Customer Journey Orchestration via Probabilistic Temporal Logic Modeling in CRM
dev.toΒ·9hΒ·
Discuss: DEV
πŸŽ›οΈFeed Filtering
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.comΒ·2hΒ·
πŸ—οΈPaleocryptography
Expert: Europe should wage information warfare inside Russia
sverigesradio.seΒ·2d
πŸ”Polish Cryptanalysis
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.comΒ·9h
πŸ•΅οΈSteganographic Compression
ELA-1534-1 freeipa security update
freexian.comΒ·6h
🎫Kerberos Exploitation
Public Key Infrastructure with Secure Shell
free-pmx.orgΒ·15hΒ·
Discuss: r/homelab
🎯NTLM Attacks
Russia’s Hybrid War Against NATO Ramping Up: Danish Intelligence
twz.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Polish Cryptanalysis
Fun with HyperLogLog and SIMD
vaktibabat.github.ioΒ·1dΒ·
πŸ“ŠHyperLogLog
Two thought experiments
surfingcomplexity.blogΒ·11h
πŸ‘οΈSystem Observability
Satellite Warfare – An Analysis
digitalforensicsmagazine.comΒ·1d
🎯Threat Hunting
A History of Active Directory Security
adsecurity.orgΒ·1d
🏺Kerberos Archaeology
Footnotes to a couple of weeks: Category mistakes, Dutch courtyards, MartinΕ―
logicmatters.netΒ·1d
πŸ”€Category Theory
Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure
wired.comΒ·1d
πŸ›‘Cybersecurity
The weak link: the case for soft skills in the intelligence analysis profession
tandfonline.comΒ·2d
πŸ•΅Intelligence
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.comΒ·2d
🌳Archive Merkle Trees
Stripped of Myths
nybooks.comΒ·3d
❄️Nordic Design Philosophy