Blog

Deep dives into data engineering, AI systems, and the tools I build.

n8n Locally? Why? How?
Nov 12, 20253 min read

n8n Locally? Why? How?

You know that one friend who swears automation will “save you hours”?

linuxuser-researchpythondocker
“Scan to receive” The Clever UPI QR Scam You Should Know About
Jun 29, 20254 min read

“Scan to receive” The Clever UPI QR Scam You Should Know About

There’s nothing more infuriating than getting scammed — especially on a peaceful Sunday morning — and perhaps more shameful when your country becom...

scamfinancial-planningcybersecuritypython
Revolution of 2001 : Advance Encryption Algorithm
May 15, 20242 min read

Revolution of 2001 : Advance Encryption Algorithm

Revolution of 2001 : Advance Encryption Algorithm

cryptocryptographycybersecuritysecurity
Is it Occultism or just a Geometric Cryptogram?
Feb 18, 20242 min read

Is it Occultism or just a Geometric Cryptogram?

Diving deeper into historic cryptograms we also see graphical ciphers. They provided a representational method to hide your message. Such ciphers have been documented for centuries being used in occults and secret societies.

historysecuritycryptographycybersecurity
New ways to hide your text for dummies
Jan 12, 20243 min read

New ways to hide your text for dummies

The easiest way to hide messages is to replace it with something different. And today we’ll be covering such a cipher(if you can call it that).

cybersecuritysecuritycryptographycryptography-for-dummies
With Purpose Without Use: Affine Cipher
Nov 2, 20233 min read

With Purpose Without Use: Affine Cipher

Although rarely employed in practice, the Affine cipher is a prominent name often encountered in the field of cryptography. In order to understand ...

historysecurityeducationcryptography
Tool of Historic and Modern Espionage: Steganography
Aug 11, 20234 min read

Tool of Historic and Modern Espionage: Steganography

Throughout history, we have been trying to find ways to hide information, but it has rarely been adequate in practice. This time I came across a ra...

securitysteganographycybersecurityhistory
Unveiling the Story and Significance of the RSA Algorithm
Jul 12, 20235 min read

Unveiling the Story and Significance of the RSA Algorithm

Let’s talk about one of the most famous algorithms in cybersecurity, the RSA algorithm. As simple as it is, it has yet to be broken. It was created...

historycybersecurityencryptioncryptography
Living in the shadow of Vigenère: Beaufort Cipher
May 25, 20232 min read

Living in the shadow of Vigenère: Beaufort Cipher

Considered widely a variation of the Vigenère Cipher, the Beaufort Cipher is also a polyalphabetic substitution cipher that makes use of a lookup table when being encoded and decoded by hand.

securityjavascriptencryptioncipher
Keeping it Simple with Railfence Cipher Encryption
Apr 28, 20232 min read

Keeping it Simple with Railfence Cipher Encryption

Now, obviously, not all ciphers can be perfect and secure, so today we will be understanding a rather easy-to-understand cypher, the Railfence Ciph...

cryptographyjavascriptencryptioncoding

10 of 10 posts