http://blog.archivep75mbjunhxc6x4j5mwjmomyxb573v42baldlqu56ruil2oiad.onion
They ranged from “Invariant-centric threat modeling” by Ying Tong Lai to “Homomorphic Quantum-resistant Proxy Reencryption (aka Recrypt) by Duke Dorje ( Identikey ). Rae McKelvey traced her decade-long career from PhD student, DAT developer, Awana Digital developer, Ink and Switch researcher, to venture-backed team manager.