##cryptography
The World's Most Mysterious Book vs. AI: Decoding the Voynich Manuscript
For 600 years, it has mocked the brightest minds in history. A book filled with impossible plants, alien astrology, and an elegant, flowing script that no human has ever been able to read. Is the Voynich Manuscript an elaborate medieval hoax, or is it the last uncracked code on Earth? What if the key to unlocking it isn't human at all? Welcome to The Unreadable Codex, the podcast where cutting-edge artificial intelligence takes on the world's most mysterious book. We're going beyond the myths to the front lines of research, where AI models like Convolutional Neural Networks are learning to see the manuscript's secrets. These aren't just guesses; they are powerful algorithms analyzing the strange word structures and low-entropy patterns that suggest this is a real, encoded language, not just clever gibberish. Join us as we follow the digital breadcrumbs, exploring the work of the five distinct scribes who created this enigma, the mystery of its bizarre "gallows" characters, and the race to build an AI that can finally think like a 15th-century cryptographer. The greatest linguistic mystery in history has met its match, and it's a machine. If you believe that the past holds secrets we're only just beginning to unlock, you've found your next obsession. Follow us now, and be the first to know when the unreadable is finally read.
www.spreaker.com
November 12, 2025 at 10:16 AM
NCL Web Application Challenge: Infosec Blog — CTF Write-Up

Interest | Match | Feed
Origin
systemweakness.com
November 12, 2025 at 8:34 AM
The Open Source Cryptography Workshop is returning for 2026

https://insufficient.coffee/2025/11/06/oscw-2026/
November 12, 2025 at 7:07 AM
Coinbase Security series: what is MPC and how to use it for Key Management: youtu.be/qdhM3syDkxM
#cryptography
Coinbase Security Series: Open Source MPC Key Management
YouTube video by Base
youtu.be
November 12, 2025 at 6:41 AM
🛍️ If interested in purchasing, please consider using this link to support the Canon: amzn.to/43VPQap

@nostarchpress.bsky.social sky.social #CyberscurityBooks #CyberCanonHoFCandidate #Cryptography
November 11, 2025 at 2:30 PM
Quantum TELEPORTATION is Real: Inside the UNHACKABLE Internet
Forget everything you thought you knew about teleportation. It's real, it just happened on the live internet, and it's about to trigger the biggest technological revolution of our lifetime. This isn't a lab experiment in a vacuum anymore. Researchers at Northwestern University just achieved the impossible: they successfully performed quantum teleportation using the same fiber optic cables that deliver this podcast to you. We're diving deep into the monumental breakthrough that proves the quantum internet can coexist with our current infrastructure, meaning the future is arriving far faster than anyone predicted. Join us as we explore how this changes everything for cybersecurity. We're talking about a truly unhackable internet, where your data isn't protected by complex code, but by the fundamental laws of quantum physics. What does it mean to teleport the quantum state of light? And how will this lay the foundation for a new era of quantum computing and secure quantum communication? This isn't just a science story; it's the opening chapter of a new world. The quantum revolution won't be televised—it'll be teleported. Subscribe now to understand the future before it arrives.
www.spreaker.com
November 11, 2025 at 9:40 AM
So what’s the fundamental difference between PPK #cryptography & #AES (symmetric key?) #encryption?
November 10, 2025 at 5:55 PM
So this story in @warontherocks.bsky.social about #Shor & #Grover algorithms breaking today’s #PublicKey #cryptography is alarmistic?
A Bletchley Park for the Quantum Age
Bletchley Park was more than a place — it was a method. During World War II, the United Kingdom combined science, engineering, operations, and alliance
warontherocks.com
November 10, 2025 at 2:51 PM
# Linux 6.19 is set to introduce ML-DSA/Dilithium for module signing — the first post-quantum cryptography integration in the kernel Security, to my knowledge # PostQuantum # Cryptography - src : https://www. phoronix.com/news/Dilithium-ML -DSA-Module-Sign

Interest | Match | Feed
Origin
piaille.fr
November 10, 2025 at 12:17 PM
Can you decipher this sentence? 🧠 🔏

#indiegame #gamedev #indiedev #videogames #cryptography
November 7, 2025 at 10:57 PM
Just published two posts on KZG Polynomial Commitments - a fundamental building block in zero-knowledge proofs!

I am always looking for feedback, so send me some :)

oguzhanstech.com/2025/11/07/k...

#ZeroKnowledge #Cryptography #Blockchain #TechnicalWriting #KZG #Plonk
KZG Batching in Plonk
In my last post, we explored the KZG Polynomial Commitment Scheme, a powerful tool for proving that a secret polynomial $p(X)$ evaluates to a certain value $y$ at a public point $z$. That is, we can p...
oguzhanstech.com
November 7, 2025 at 1:48 PM
November 6, 2025 at 10:53 PM
November 6, 2025 at 3:18 PM
The Researcher-Vector: Stegano-Text’s Infinite Window of Contagion

Interest | Match | Feed
Origin
systemweakness.com
November 6, 2025 at 10:49 AM
Happy “Key” day! Is it just a coincidence that today’s level 1 Crypto Tiles puzzle is both a word and a representation of today’s date (11/5/25)? When is the next time the date will form a real word?

From tiletalk.tilefarm.com

#iTeachMath #hexagon #cryptography #EduSky #mathEducation
November 5, 2025 at 4:59 PM
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes Every website deals with the same problem: bots crawling your site, and absolutely no reliable way to know which ones are legit. That ...

#security #ietf #authentication #cryptography

Origin | Interest | Match
Web Bot Auth: Giving Bots a Crypto ID Card in a World of Fakes
Every website deals with the same problem: bots crawling your site, and absolutely no reliable way to...
dev.to
November 5, 2025 at 5:18 AM
There are 3 classes in the #cryptocurrency ecosystem: #commercial, #casino, and #cypherpunk.

Commercial crypto includes RWAs, stablecoins, and institutional systems focused on efficiency but riddled with hidden centralization risks.

Casino crypto is speculative and profit-driven, and thrives […]
Original post on federate.social
federate.social
November 5, 2025 at 12:10 AM
Not only is this the level 1 Crypto Tiles puzzle on tiletalk.tilefarm.com but it’s also what you should go do today! Hint: the number of tiles in each cluster corresponds to a letter in the alphabet.
#iTeachMath #cryptography
November 4, 2025 at 3:41 PM
"Since #cryptography is still a pretty big passion of mine, I've hidden lots of "secret messages" throughout all my books."
Fun fact #3: in my previous career, I did some work in Cryptography (encrypting & decrypting written messages/cyphertext)

Since #cryptography is still a pretty big passion of mine, I've hidden lots of "secret messages" throughout all my books.

The LARGEST SECRET of all still remains undiscovered💙📚
November 4, 2025 at 3:34 PM
The Researcher-Vector: Stegano-Text’s Infinite Window of Contagion Author: Berend Watchus November 4, 2025 Foresight article This foresight article examines a systemic vulnerability in AI safety ...

#ai #cybersecurity #cyber-security-awareness #malware #cryptography

Origin | Interest | Match
The Researcher-Vector: Stegano-Text’s Infinite Window of Contagion
Author: Berend Watchus November 4, 2025 Foresight article
systemweakness.com
November 6, 2025 at 10:53 AM
Cryptographic Implementation Bugs: The Hidden Flaws Weakening Modern Encryption A cryptographic implementation bug occurs when cryptographic functions — such as encryption, hashing, or key ma...

#machine-learning #cryptography #business #hacking #cybersecurity

Origin | Interest | Match
🔎 Cryptographic Implementation Bugs: The Hidden Flaws Weakening Modern Encryption
A cryptographic implementation bug occurs when cryptographic functions — such as encryption, hashing, or key management — are incorrectly…
medium.com
November 4, 2025 at 3:39 AM
📰 Bug Serius di AMD “Zen 5” RDSEED Dapat Melemahkan Keamanan Kriptografi

👉 Baca artikel lengkap di sini: https://ahmandonk.com/2025/11/04/amd-zen5-rdseed-bug-cryptographic-key-risk/

#agesa #
am#agesap#amda#cryptography-#cve6 #firmware-#firmwaredseed #s#rdseed #securityi#vulnerabilityref="/hashtag/zen5" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#zen5
November 4, 2025 at 2:03 AM
Quantum computing is rewriting the rules of cybersecurity. 🧬🔐

Learn how to secure cryptography for the next era and protect data in 2025 & beyond:
🌐 cyberphore.com/quantum-compu...

#CyberPhore #QuantumComputing #Cryptography #CyberSecurity #InfoSec #PostQuantumSecurity
Quantum Computing Security & Cryptography Guide: Preparing for Post-Quantum Security
Complete quantum computing security and cryptography guide for 2025. Learn about quantum threats to encryption, post-quantum cryptography, and preparing for quantum-safe security.
cyberphore.com
November 3, 2025 at 4:00 PM