read.ehrlich.dev
ai-curated rss
about
github
rss
dark
cryptography
Protocols for secure message encoding and decryption schemes
hot
new
week
month
year
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth
165
Threat Intelligence Report: MANGO SANDSTORM Dindoor / Fakeset Campaign
(krypt3ia.wordpress.com)
24 days ago ·
malware analysis
·
cryptography
220
One Key Good, L Keys Better: List Decoding Meets Quantum Privacy Amplification
(arxiv.org)
24 days ago ·
cryptography
·
quantum computing
28
FBI, CISA Warn Russian Hackers Are Targeting High-Value Individuals Through Signal
(cybersecuritynews.com)
23 days ago ·
security
·
cryptography
82
Post-Quantum Web Could be Safer, Faster
(darkreading.com)
25 days ago ·
cryptography
·
quantum computing
8
У трьох областях – 6 загиблих та 27 поранених цивільних
(pravda.com.ua)
23 days ago ·
cryptography
·
mathematics
150
Pasqal and Kipu Quantum Demonstrate Analog Counterdiabatic Optimization on 100 Qubits
(quantumcomputingreport.com)
26 days ago ·
quantum computing
·
cryptography
70
How One-Time Passwords work
(dkrichards.com)
25 days ago ·
cryptography
·
security
8
Niemcy: Policjant wygrał z przełożonymi. Sąd pozwolił mu na noszenie turbanu
(rp.pl)
24 days ago ·
digital rights
·
cryptography
8
Obywatel Polski objęty sankcjami Białego Domu. Jest oskarżony o finansowanie Hezbollahu
(rp.pl)
24 days ago ·
cryptography
·
math olympiad
25
You have to invite them in
(blog.talosintelligence.com)
25 days ago ·
security
·
cryptography
580
Broken By Design: A Longitudinal Analysis of Cryptographic Failures in Alipay Mobile Payment Infrastructure
(eprint.iacr.org)
28 days ago ·
cryptography
·
security
185
Simplifying Certificate Renewals for Millions of Domains with ACME Renewal Information (ARI)
(letsencrypt.org)
28 days ago ·
api design
·
cryptography
270
Benchmarking Exported Key Material from Commercial QKD Systems Using SENTRY-Q: A Model-Based Output Validator
(eprint.iacr.org)
28 days ago ·
quantum computing
·
cryptography
82
South Korean Police Accidentally Post Cryptocurrency Wallet Password
(schneier.com)
27 days ago ·
digital rights
·
cryptography
110
Cryptographic protocol analysis with Verifpal
(blog.peramid.es)
1 month ago ·
formal verification
·
cryptography
135
Identity Is Who You Are
(code.sgo.to)
1 month ago ·
design
·
cryptography
28
ИТ-предприниматель из Австралии сделал мРНК-вакцину от рака для своей собаки, вооружившись ChatGPT — cross-cutting
(meduza.io)
29 days ago ·
observability
·
cryptography
63
Short Introduction to SJCL
(blog.peramid.es)
1 month ago ·
cryptography
·
wasm
15
রাজধানীর খিলক্ষেতে বিদ্যুৎস্পৃষ্ট হয়ে বিদ্যুৎ বিভাগের তিন কর্মীর মৃত্যু
(prothomalo.com)
29 days ago ·
cryptography
·
birding
45
Blind Signatures
(code.sgo.to)
1 month ago ·
math olympiad
·
cryptography
22
Cert Authorities Check for DNSSEC From Today
(grepular.com)
29 days ago ·
security
·
cryptography
280
Securely Scaling Autonomy: The Role of Cryptography in Future Unmanned Aircraft Systems (UAS)
(eprint.iacr.org)
1 month ago ·
cloud infrastructure
·
cryptography
18
Ethereum Foundation Sells 5,000 ETH for $10.2M in OTC Deal: Ethereum Foundation
(thedefiant.io)
29 days ago ·
cryptography
·
data engineering
8
НАБУ заявляє про безпідставне затримання свого співробітника представниками СБУ
(pravda.com.ua)
29 days ago ·
cryptography
·
internet culture
65
Instagram is removing end-to-end encryption
(gsmarena.com)
1 month ago ·
digital rights
·
cryptography
25
Email Verification Protocol Devtrial
(code.sgo.to)
1 month ago ·
cryptography
·
typescript
22
F1's Multi-Million Crypto Sponsorships at Risk as Middle East Conflict Forces Race Cancellations: FIA
(thedefiant.io)
1 month ago ·
math olympiad
·
cryptography
74
Privacy-preserving machine learning with homomorphic encryption
(abstractnonsense.xyz)
1 month ago ·
digital rights
·
cryptography
10
সোনালি যুগে মুসলিম মনীষীদের জ্ঞানসাধনা
(prothomalo.com)
1 month ago ·
cryptography
·
birding
12
রাজশাহীতে নির্মাণাধীন ভবনের ছাদ থেকে পড়ে শ্রমিকের মৃত্যু
(prothomalo.com)
1 month ago ·
cryptography
·
birding
38
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
(thehackernews.com)
1 month ago ·
digital rights
·
cryptography
8
В Казахстане хотят переписать почти всю конституцию; cross-cutting
(meduza.io)
1 month ago ·
cryptography
·
internet culture
22
Mine e barchini su tutta la costa iraniana, la fortezza invincibile dei pasdaran
(repubblica.it)
1 month ago ·
cryptography
·
cartography
95
Iran MOIS Colludes With Criminals to Boost Cyberattacks
(darkreading.com)
1 month ago ·
malware analysis
·
cryptography
10
Иран назвал Украину своей «законной целью». В Киеве ответили, что Тегеран «обучил россиян убивать украинцев»
(meduza.io)
1 month ago ·
cryptography
·
aerospace
8
আন্তর্জাতিক আইন লঙ্ঘন করে তাহলে কি নৃশংসতাকে উসকে দিচ্ছেন মার্কিন প্রতিরক্ষামন্ত্রী
(prothomalo.com)
1 month ago ·
political philosophy
·
cryptography
8
Thailand’s parliament opens amid scrutiny over bar codes on election ballots
(scmp.com)
1 month ago ·
cryptography
·
digital rights
22
Instagram is getting rid of end-to-end encrypted DMs that ‘very few’ people used
(theverge.com)
1 month ago ·
digital rights
·
cryptography
8
Izrael chce unicestwić Hezbollah. Liban karany za Iran
(rp.pl)
1 month ago ·
cryptography
·
digital rights
315
Six mistakes in ERC-4337 smart accounts
(blog.trailofbits.com)
1 month ago ·
cryptography
·
security
25
Quartz ring proves its wearer is human in the age of AI
(dezeen.com)
1 month ago ·
design
·
cryptography
22
Maintaining Security and Protecting Smart Home Devices from Hackers
(hackread.com)
1 month ago ·
homelab
·
cryptography
38
Certbot and Let's Encrypt Now Support IP Address Certificates
(eff.org)
1 month ago ·
cryptography
68
Six-Day and IP Address Certificates Available in Certbot
(letsencrypt.org)
1 month ago ·
cryptography
·
security
140
OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector
1 month ago ·
security
·
cryptography
85
OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector
1 month ago ·
security
·
cryptography
72
The RSAC 2026 Conference talks worth catching
(redcanary.com)
1 month ago ·
cryptography
·
malware analysis
48
Intel Demos Chip to Compute With Encrypted Data
(spectrum.ieee.org)
1 month ago ·
cryptography
18
PCID Urges Government Action Amidst Rising Middle East Tensions
(currentph.com)
1 month ago ·
cryptography
·
digital rights
28
Telesign SMS Messaging API integration is now available in the Auth0 Marketplace
(auth0.com)
1 month ago ·
webdev
·
cryptography
15
Coronary Calcium Score (CAC) — Silent Heart Disease, CT Calcium Scan, Heart Attack Risk
(currentph.com)
1 month ago ·
pharmacology
·
cryptography
340
Byzantine Consensus in the Partially Authenticated Setting
(eprint.iacr.org)
1 month ago ·
distributed systems
·
cryptography
42
Amazon AWS-LC Vulnerabilities Allows Attackers to Bypass Certificate Chain Verification
(cybersecuritynews.com)
1 month ago ·
cryptography
·
security
85
Un homme soupçonné d’avoir volé 46 millions de dollars en cryptomonnaies arrêté par le FBI et le GIGN à Saint-Martin
(ouest-france.fr)
1 month ago ·
math olympiad
·
cryptography
72
Suspected DPRK Threat Actors Compromise Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
(cybersecuritynews.com)
1 month ago ·
cryptography
85
Hacked App Part of US/Israeli Propaganda Campaign Against Iran
(schneier.com)
1 month ago ·
malware analysis
·
cryptography
38
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
(darkreading.com)
1 month ago ·
cryptography
·
digital rights
12
I Built a Blockchain Voting System with RSA Encryption — Here's How It Works
(dev.to)
1 month ago ·
cryptography
·
distributed systems
42
Confluent Cloud’s Path to Post-Quantum Cryptography
(confluent.io)
1 month ago ·
cryptography
·
distributed systems
42
Crypto Crime Hits Record $154 Billion as Sanctioned States Turn to Blockchain
(thedefiant.io)
1 month ago ·
cryptography
·
digital rights
12
Setting up UniqueSignal in MISP
(vmray.com)
1 month ago ·
cryptography
·
observability
22
Auth0 Fine-Grained Authorization (FGA) for Enterprise Trust
(auth0.com)
1 month ago ·
cloud infrastructure
·
cryptography
12
Politie neemt 1,6 miljoen euro aan crypto in beslag na vondst wallet-wachtwoord
(security.nl)
1 month ago ·
digital rights
·
cryptography
12
В Будапеште задержали сотрудников Ощадбанка | cross-cutting
(meduza.io)
1 month ago ·
cryptography
·
digital rights
42
Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA
(hackread.com)
1 month ago ·
cryptography
·
security
8
Piotr Arak: Program SAFE, czyli pożyczka z sąsiadem
(rp.pl)
1 month ago ·
algorithmic trading
·
cryptography
42
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
(thehackernews.com)
1 month ago ·
digital rights
·
cryptography
8
২০০ টাকায় দেখা যাবে বাংলাদেশ–পাকিস্তান ম্যাচ
(prothomalo.com)
1 month ago ·
cryptography
·
cartography
8
West Melbourne mosque shut after suspicious package discovered during Ramadan, police investigating
(perthnow.com.au)
1 month ago ·
cryptography
42
Disruption targets Tycoon 2FA, popular AiTM PhaaS
(proofpoint.com)
1 month ago ·
cryptography
·
cloud infrastructure
12
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
(thehackernews.com)
1 month ago ·
cryptography
·
quantum computing
12
Трамп решил уволить Кристи Ноэм с поста министра внутренней безопасности США
(meduza.io)
1 month ago ·
mathematics
·
cryptography
12
Revolut, Zerohash Pursue US National Banking Charters
(thedefiant.io)
1 month ago ·
cryptography
·
databases
12
Второй фронт войны США и Израиля с Ираном — это Ливан. Что там происходит? Правительство Ливана фактически поддерживает вторжение на свою территорию
(meduza.io)
1 month ago ·
mathematics
·
cryptography
8
Іран готовий відбити сухопутний наступ військових США – глава МЗС
(pravda.com.ua)
1 month ago ·
digital rights
·
cryptography
6
গোবিপ্রবি বন্ধুসভার পাঠচক্রে সুকান্ত বিশ্বাসের ‘ভূতের রাজা কিং ভূত’
(bondhushava.com)
1 month ago ·
political philosophy
·
cryptography
12
Domeinnamen phishing-as-a-service platform Tycoon 2FA offline gehaald
(security.nl)
1 month ago ·
cryptography
·
security
12
Minister: decryptie-plan Brussel betreft in beslag genomen telefoons
(security.nl)
1 month ago ·
digital rights
·
cryptography
3
Polska aktywowała Unijny Mechanizm Ochrony Ludności
(rmf24.pl)
1 month ago ·
digital rights
·
cryptography
280
Anonymous credentials: an illustrated primer
(blog.cryptographyengineering.com)
1 month ago ·
cryptography
3
Odwołane loty w obliczu wojny z Iranem. Kto ma szansę odzyskać pieniądze?
(rp.pl)
1 month ago ·
cryptography
·
digital rights
42
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
28
Post-Quantum Anonymous Signatures from the Lattice Isomorphism Group Action
(eprint.iacr.org)
1 month ago ·
cryptography
·
math olympiad
28
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
27
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
25
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
25
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
12
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
12
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
12
Expanding Phishing Detection at Scale with Automatic SSL Decryption
1 month ago ·
cryptography
·
malware analysis
12
Revisiting the Security of Sparkle
(eprint.iacr.org)
1 month ago ·
cryptography
·
distributed systems
3
Countdown to IEEE’s Annual Election
(spectrum.ieee.org)
1 month ago ·
cryptography
·
ham radio
170
Ultra short signatures with Dragon $HFE_{LL'}$
(eprint.iacr.org)
1 month ago ·
cryptography
·
quantum computing
12
US-Israel vs. Iran War Could Unravel Peace in Mindanao
(currentph.com)
1 month ago ·
nuclear
·
cryptography
85
Cultivating a robust and efficient quantum-safe HTTPS
(security.googleblog.com)
1 month ago ·
cryptography
·
api design
42
On the Binding Security of KEMs based on RSA and DH
(eprint.iacr.org)
1 month ago ·
cryptography
335
A Comprehensive Break of the Tropical Matrix-Based Signature Scheme
(eprint.iacr.org)
1 month ago ·
cryptography
·
math olympiad
28
Protect Your MCP Tools With Auth0 FGA in TypeScript
(auth0.com)
1 month ago ·
cryptography
·
api design
85
Cryptography Engineering Has An Intrinsic Duty of Care
(soatok.blog)
1 month ago ·
cryptography
·
malware analysis
12
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity
(redcanary.com)
1 month ago ·
security
·
cryptography
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth