Cookie Consent by PrivacyPolicies.com
Home
Quantumly Confused
Cancel

Building a Production-Grade Minecraft Cloud Infrastructure

Building a Production-Grade Minecraft Cloud Infrastructure

Journey of building a production-grade Minecraft server in the cloud, including management, monitoring, and observability - all for free!

Post-Quantum Cryptography - Practical Kyber Experimentation

Post-Quantum Cryptography - Practical Kyber Experimentation

Continuing down the rabbit hole of PQC investigating the Kyber implementation more directly, then using experimental branches of common tooling to explore practical implementation of post-quantum cryptography.

Post-Quantum Cryptography - Standardization and Summarization

Post-Quantum Cryptography - Standardization and Summarization

A post going over the current post-quantum cryptography landscape, including the current NIST standardization efforts and the underlying mathematical approaches to selected algorithms. This second post in the PQC series sets the groundwork for the practical exploration using experimental branches in the upcoming third post.

Post-Quantum Cryptography - Shor's Algorithm in Action

Post-Quantum Cryptography - Shor's Algorithm in Action

A post going over the theoretical implementation of Shor's algorithm as well as covering a previous Qiskit challenge that involved practically implementing Shor's to factor the number 35. This will lay the groundwork to further posts exploring the need for post-quantum cryptography and implementations so far.

HVAC Troubleshooting - Journey to SME Status

HVAC Troubleshooting - Journey to SME Status

Have you ever cleaned a heavy piece of machinery with a hand-held vacuum? What is a Canadian summer without another HVAC issue! Let's dive into a new error that popped up recently leaving me two weeks without cooling, and what I learned from it!

NSEC 2023 - N64 - Document Dropper 2 Reverse Engineering

NSEC 2023 - N64 - Document Dropper 2 Reverse Engineering

Walkthrough of NSEC 2023's two N64 ROM challenges. This post will cover the ROM analysis, including loading into Ghidra, extracting debug symbols from a separately provided file, and then stepping through the logic loop to determine the right input. Ultimately the challenge was solved using a memory buffer overflow arbitrarily calling the printflag() function.