1. How does Encryption Break work - BREAKING Encryption-Breaking

    How does Encryption Break work - BREAKING Encryption-Breaking

    48
    1
  2. RFK Jr. independent? (or like Howard Dean 20 years earlier)

    RFK Jr. independent? (or like Howard Dean 20 years earlier)

    181
  3. The NSA Secret Police monitors every keystroke of yours - 100%. How would you stop that?

    The NSA Secret Police monitors every keystroke of yours - 100%. How would you stop that?

    109
  4. Secure Social Media Part 2 - via Memory Pools of Amazon, COSTCO, etc.

    Secure Social Media Part 2 - via Memory Pools of Amazon, COSTCO, etc.

    35
  5. Internet's Primary Problem - it's probably not what you think it is

    Internet's Primary Problem - it's probably not what you think it is

    76
  6. Controling Social Media (Backwards-Filter-Streaming)

    Controling Social Media (Backwards-Filter-Streaming)

    87
  7. Short but Hard lessons from the 1-day Iran-Israel war

    Short but Hard lessons from the 1-day Iran-Israel war

    76
  8. BRICS Blockchain Approach vs. BITcoin Scalability Catastrophe

    BRICS Blockchain Approach vs. BITcoin Scalability Catastrophe

    82
  9. E2E Encryption Comparison: Digits Container vs. Strings Container

    E2E Encryption Comparison: Digits Container vs. Strings Container

    72
  10. George Orwell's Quotes which are better to be known when young to not Regret in Old Age

    George Orwell's Quotes which are better to be known when young to not Regret in Old Age

    27