Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

Reading historical shorthands with AI

Cyberinchief by Cyberinchief
October 21, 2025
Reading Time: 4 mins read
0
Reading historical shorthands with AI


David Rogers speaking in the Bletchley Park auditorium

Earlier in 2025, I was pleased to be at Bletchley Park with my colleagues who had been working on the TAIBOM project for my company. As part of this work, we had to choose two AI models to develop that would be used for testing of the various different features for the security of future AI. More on this can be found on the TAIBOM site, but this is not really the purpose of this blog.

RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

The talk was really the follow-on from this blog I wrote at the end of 2023 on my research into a mysterious document. Eventually that led to the work I’m doing now – a lot in my spare time, but we’ve also been able to combine it with our day-to-day security work for the TAIBOM project which has been great.

The talk I gave touches on some of the many side-quests that I’ve found along the way – either through documents I’ve discovered or have been sent, or to the many famous historical figures who used shorthand from the 17th century (even up to today!). There were also a multitude of shorthands from different authors that looked very similar, so this has been a big challenge – and continues to be for all students of this subject. I am trying to keep track of what I find and I hope to begin steadily posting some of these interesting subjects which range from the Quakers through to the subject of alchemy!

Video of my talk at Bletchley Park

We’ve been creating various datasets to support the model that we’ve developed in a very structured way (we have invented our own digital standard for this) – indeed, there will be multiple models for different shorthand dictionaries and some other logographic datasets.

The picture shows some of my team demonstrating to people at Bletchley Park the Thomas Shelton model, so they people can try writing symbols of words and see if our model can recognise it. Thomas Shelton’s shorthand was used by Samuel Pepys for his diary (and his day-to-day business).

Demo of using a quill and ink to write shorthand and then read it with AI on a laptop.
Using quill and ink to write shorthand characters which can then be read with AI.

So watch this space – I’ll probably put up a separate area of the site to cover this subject.

Buy JNews
ADVERTISEMENT

Like this:

Like Loading…



Source link

Tags: historicalReadingshorthands
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
PassiveNeuron Targets High-Profile Servers to Deploy Malware

PassiveNeuron Targets High-Profile Servers to Deploy Malware

Cyber Crime Attacks! | Cyber Crime Explained In Telugu | Voice Of Telugu – Ethical Hacking

Cyber Crime Attacks! | Cyber Crime Explained In Telugu | Voice Of Telugu - Ethical Hacking

Recommended Stories

CYBERSECURITY RoadMap : How to become Ethical Hacker in 2024?

CYBERSECURITY RoadMap : How to become Ethical Hacker in 2024?

October 14, 2025
Signs you’ve been phished and what to do next.

Signs you’ve been phished and what to do next.

November 23, 2025
The Cybersecurity Jobs AI Will Kill by 2026 — And the Ones That Will Thrive

The Cybersecurity Jobs AI Will Kill by 2026 — And the Ones That Will Thrive

November 24, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested