New: decryptionAll contenthive-129948hive-196917krzzanhive-183959steemphotographyhive-180932hive-150122hive-166405hive-185836uncommonlablifehive-183397hive-144064bitcoinhive-188619krsuccesshive-139150hive-103599hive-101145hive-124908hive-180301hive-109690hive-167213TrendingNewHotLikershussa (46)in hive-166405 • last yearUnderstanding Encryption and Decryption in CryptographyIntroduction: Cryptography plays a crucial role in ensuring data security by converting information into an unreadable form, making it accessible only to the intended recipients. In this blog…lordling (80)in cryptography • 2 years agoThe Art and Science of Cryptography: Decoding Hidden MessagesHave you ever wanted to uncover hidden messages that only a select few can decipher? Do you find yourself fascinated by the intricacies of cryptography, the art and science of creating secure…san-jay (25)in mpeg-dash • 2 years agoHow to Play MPEG-DASH Encrypted Protected Content Using Encrypted Media Extensions (EME) in BrowserLong title right? Let's break it and go step by step. How do you play a normal mp4 media in browser? All you need to do in an HTML document is to add the video URL to the element by using the…the-prithvi (56)in hive-175254 • 3 years agoCryptography - Everything you need to know about cryptography!Small Life update [Skip to next paragraph for content on cryptography]. I had some intense final exams going on, and I couldn't blog for about 2 months because they were suddenly announced to be…techcoderx (64)in encryption • 4 years ago Hivecrypt: JavaScript module for Steem memo encrypt/decrypt on wide range of environmentsAre you getting the following error message when trying to encrypt or decrypt a Steem memo in ElectronJS or React Native using steem-js ? Perhaps looking for something that works for your…cybersecway.com (31)in decryption • 4 years agoHow To Protect Data In Pen DriveAre you a user of USB drives? Then, this post will help you to safeguard your data! You might have heard about data theft, is not it? However, do you know lost USB drives are responsible for most of…pedrobrito2004 (67)in cryptocurrency • 5 years agoCould Blockchain Tech Be Vulnerable To Quantum Decryption?Today, I want to ponder the question “could blockchain tech be vulnerable to quantum decryption” and look at what others are saying as well as add some of my own thoughts to the conversation. I…twr (53)in bug • 6 years agoSignal Desktop App Vulnerability Exposes Message Decryption Key To The UsersSignal has been popular for quite a while owing to its encrypted messaging feature. However, just recently, the desktop version exhibited a vulnerability that ruined the entire encryption feature of…meetyy (0)in blockchain • 6 years agoBlockchain and Art: Find 310 BTC in this pictureRecently an anonymous user released a picture online. This picture contains four clues, each clue represents a private key of Bitcoin wallet. These wallets contain 0.1 BTC, 0.2 BTC, 0.31BTC and 310…lappen (25)in cryptomator • 6 years agoVideoanleitung CryptomatorVideoanleitung für das Tool Cryptomator. Mit Cryptomator können Sie ihre Daten verschlüsselt in der Cloud ablegen. ▶️ DTube ▶️ IPFSjoeridamian (54)in decryption • 7 years agoDecrypting, a simple lesson (From hackthissite.org)how do we decrypt 5278f:il if we know the encryption key? Lucky network security sam has left the encryption public. In lesson 6 we look at this. Let's try to see what 2 strings are so we know…erkan (60)in boinc • 7 years agoBOINC projects Enigma@home and Moo! Wrapper sites are downThese 2 BOINC projects' websites are currently down: Enigma@home (a project to decipher old messages created with the Enigma machine) seems down since >17h. Also Moo! Wrapper (a project that…erkan (60)in gridcoin • 7 years agoEnigma@home has less WUs -> reason: message from 1941 decrypted -> cleaning up not needed WU batches + preparing new WUsAnother message from the past (year 1941) was decrypted by Enigma@home, and because of this: "There might be a short break in WU availability as I have to clean up batches that are not needed…engrqd (48)in datasecurity • 7 years agoWhat is Cryptography?engrqd (48)in datasecurity • 7 years agoData Security Threats Typezargham (25)in crypto • 7 years agoComplete PGP GuideThe goal here today is to try and educate newbies on what PGP is, how to install GPA, I'm making the guide because I educated myself on PGP and it took awhile for me to understand it. So here is a…neox (25)in jumper • 7 years agoWhat is your decryption? - The movie "Jumper" (2008 © 20th Century Fox )Sometimes we meet people that are living life the easy way. They dont seem to ever have worried much about anything. They always lived life the easy way. As they do so, you wouldnt think of them…nixontechblog (25)in petya • 7 years agosteemCreated with Sketch.Private Decryption Key For Original Petya Ransomware ReleasedPetya Ransomware An individual passing by the twitter handle leostone could make a create an algorithm that can produce the watchword used to decode a Petya encoded PC. In my test this, this…jigarparmar519 (45)in encryption • 7 years agoEncryptionWhen we visit a website that features that little padlock in the corner of our browser we’re trusting it to keep our data safe and whether it’s our credit card numbers, sensitive work documents are…zeroshiki (56)in hackers • 8 years agoWannaCry ransomware decryption tool releasedGuinet works as a security expert, Suiche is an internationally known hacker, and Delphy took part at night, in his spare time, outside his day job at the Banque de France. The tool, however, works…