http://revuo75joezkbeitqmas4ab6spbrkr4vzbhjmeuv75ovrfqfp47mtjid.onion/periodicals/periodical-3-2019.html
So far, the topics covered include: a ring signatures introduction, 0-decoy and chain reactions, chain splits (key image reuse attack), input selection algorithm, unusual ringsize, remote nodes, timing attacks, poisoned outputs (EAE attack), public mining pools, input/output metadata, and blockchain explorer opsec.