#encryptionUnmoderated tagAll postsTrendingHotNewPromotedPayoutstitusfrost in #cicada3301 • last year#Cicada3301 Liber Primus Decode: Music Theory of the Spheres, Color of Sound, Harmonic Wheel#Cicada3301 Liber Primus Decode: Music Theory of the Spheres, Color of Sound, Harmonic Wheel Cicada 3301 Video Platforms... YouTube (Copyriggeekgirl in #hive-139531 • last yearUnderstanding Asymmetric Encryption The Hive WayAt their core, blockchain technologies rely on cryptography and encryption algorithms. While I am not a developer, I do have curiosity in understanding how blockchains work. Hive has always beendevect in #hive-163521 • 2 years agoAttacking Bitlocker disk encryption: internal Direct Memory Access (DMA) attackIn my last post I showed an external port DMA attack. This post I will perform an internal port DMA attack. This attack can be used if the external ports are blocked…devect in #hive-163521 • 2 years agoAttacking Bitlocker disk encryption: external Direct Memory Access (DMA) attackI created a video where I am performing a DMA attack with a PCMCIA to FireWire adapter on a Windows 7 machine, using Bitlocker full volume encryption with Trusted Platform Module…mrosenquist Cybersecurity Strategistin #hive-163521 • 3 months agoQuantum Encryption Replacement Algorithm Hacked by AIHas the CRYSTALS-Kyber encryption algorithm, one of 4 quantum resistant methods that NIST has recommended to replace legacy encryption, fallen even before it has been rolled…yintercept in #hive-163521 • last yearRFCs Provide an Interesting Look at the Development of the InternetThe term "Request for Comments" is often used by organizations seeking input from the public about a policy or service. For example, when the Highway Department considers…takebackourtech in #hive-167922 • 11 months agoEncrypt It Yourself I: How Email Works & The Encrypted Webmail Trap 📩🔐▶️ Watch on 3Speak After a long hiatus, #TBOT is back with anotvikisecrets in #hive-167922 • 2 years agoHow to send secret encrypted messages (memo) on Hive 🔒 (November 2021)So kann man geheime verschlüsselte Nachrichten (Memos) anderen Benutzern auf Hive schicken: Die Hive-Blockchain ermöglicht es, end-to-end verschlüsselte Nachrichten zu…michaelmaddof in #hive-167922 • last yearENCRYPTION is an ART!!! Understanding The Concept. Encryption is a word derived from the term cryptic. It is the process of transforming something comprehensible into something ambiguous. Information is locked away in such a way…vikbuddy in #hive-167922 • last yearUnderstanding Blockchain Cryptography and its Functions! source What is Cryptography? Well, we can understand it as a technique or set of them with which it is sought to alter a message by codifying it so that it can only be understood byagr8buzz in #hive-167922 • 2 years agoIt's Time To Take Your Privacy Seriously!Protect Yourself With These 3 Privacy Based Apps! How many more reports of hacks, spying, and data mining do we need to hear before people get the message? [source](agr8buzz in #hive-167922 • 2 years agoFree & Easy To Use VPN - Encrypt Your Comms!I just installed the #1 free VPN and it works great! For those of you that follow along with my journey through crypto and tech know that I am on a mission this year to make…dbroze in #hive-181335 • 2 years agoThe Decentralized, Distributed, and Disruptive (D3) Tech Summit is TODAY!▶️ Watch on 3Speak The Decentralized, Distributed, and Disruptive (D3) Tech Summit is TODAY! Derrick Broze checrok-sivante in #hive-181335 • 2 years ago......agr8buzz in #hive-193084 • 2 years ago### Ready To Take Your Privacy Seriously? Protect Yourself With These ...Ready To Take Your Privacy Seriously? Protect Yourself With These 3 Privacy Based Apps!👇 Posted via D.Buzzd-zero in #hive-193084 • 2 years agoEncryptedList: Find Products/Services With Zero-Knowledge Or End-To-En ...EncryptedList: Find Products/Services With Zero-Knowledge Or End-To-End Encryption Filter by category/tag Crowdsourced Find secure alternatives to common…natebowie in #technology • 2 years agoAES Crypt Spotlight: Encrypt Your Files Easily on any DeviceA while back spoke about nine ways to encrypt you files , but today I thought I would spotlight one tool I forgot to mention in that list: AES Crypt. While it may not be quite…natebowie in #tech • 4 months ago3 Structures of Private Messengers, how they work and their Pros/ConsVideo Version Text Version Today I thought I would talk about messengers, specifically, the different types of messengers and how they work. The goal here is to help…vasiliyxx in #waivio • 2 years agoWhy Too Long Passwords Won't Boost Your SecurityHow long should your online password be to get the maximum security possible? This article analyses this problem from a mathematical perspective. First of all, let’s analyze…