Ghost Logo / Explore
Sign in Get Started — free
Back to Explore

Vilde's Research

Cybersecurity student

Latest Posts

Cryptography: How Humans Hid Secrets Long Before Wi-Fi

Vilde · 7 Jan 2026

Phishing E-Mail Analysis

Vilde · 17 Dec 2025

What Happens to Your Data After a Phishing Attack?

Vilde · 17 Dec 2025

Contributors

Vilde

Vilde

Creator of Vilde's Research blog

More from Technology

Technology

The Curious Engineer's Notebook

Sharing security essentials and personal frameworks to help others with their learning journey.

Black Flag icon
Technology

Black Flag

Plotting to kill Roko's Basilisk with AI Red Teaming

Public Tech Insights: Europe icon
Technology

Public Tech Insights: Europe

Analysis, expertise, and guidance regarding the use of technology within government agencies, public organisations, and institutions in Europe.

Pwego icon
Technology

Pwego

Your guide to engineering the perfect content machine

Launch your site

Last week, 13,806 brand new
publications got started with Ghost.

Today, it's your turn.

Start a free trial now →