Feeds to Scour
SubscribedAll
Scoured 8833 posts in 662.1 ms
Building Defense-in-Depth Encryption: A Cascading Cipher System
positive-intentions.com·2d
🏰Capability Machines
Preview
Report Post
Microsoft SDL: Evolving security practices for an AI-powered world
microsoft.com·13h
🎭Program Synthesis
Preview
Report Post
akshat666/ephemeral-first-security-framework: Security through transience, not just encryption
github.com·14h·
Discuss: Hacker News
🔄CRDT
Preview
Report Post
CIPHER: Cryptographic Insecurity Profiling via Hybrid Evaluation of Responses
arxiv.org·1d
🏰Capability Machines
Preview
Report Post
Coding Agents Need More Than Examples. They Need Guardrails.
medium.com·13h·
Discuss: Hacker News
🎮Language Ergonomics
Preview
Report Post
The Architecture of Trust: Guardrails for Production Generative AI Applications and the Llama
pub.towardsai.net·2h
💬Prompt Engineering
Preview
Report Post
Enterprise Podman Security: Rootless Containers, SELinux, Backups & Docker Comparison
blog.nviso.eu·22h·
Discuss: r/selfhosted
🛡️Capability VMs
Preview
Report Post
Reddit-homelab-how-to-know-your-homelab-was-hacked.md
gist.github.com·1d
🌐Network Security
Preview
Report Post
Millets: A practical memory-safety and thread-safety experiment
eagledot.xyz·17h·
🎯Escape Analysis
Preview
Report Post
nilpunch/massive-ecs: Bitset-based ECS with rollbacks. C# library and Unity package.
github.com·3h
🚂Cranelift IR
Preview
Report Post
Example of Windows Warbird Encryption/Decryption
downwithup.github.io·1d·
Discuss: Hacker News
🔓Binary Exploitation
Preview
Report Post
AI Hallucination Squatting: The New Frontier of Supply Chain Attacks
instatunnel.my·18h·
Discuss: r/programming
🏰Capability Machines
Preview
Report Post
How I Structure My Data Pipelines: The Silver Layer
loglevelinfo.substack.com·3h·
Discuss: Substack
🗄️Database Internals
Preview
Report Post
The Clawbot/Moltbot/Openclaw Problem
osohq.com·8h·
Discuss: Hacker News
🔓Binary Exploitation
Preview
Report Post
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
rapid7.com·1d·
🔓Binary Exploitation
Preview
Report Post
Sandboxing AI Agents in Linux
blog.senko.net·15h·
Discuss: Hacker News
🛡️Capability VMs
Preview
Report Post
RFC 9518 - Centralization, Decentralization, and Internet Standards
datatracker.ietf.org·10h
🕸️Mesh Networks
Preview
Report Post
"Five-Point Haskell": Total Depravity (and Defensive Typing)
blog.jle.im·1d·
🚂Error Propagation
Preview
Report Post
A Quick Look at QUIC
potaroo.net·11h·
Discuss: Hacker News
QUIC Protocol
Preview
Report Post
Moving Faster and Reducing Risk: Using LLMs in Release Deployment
arxiv.org·11h
🚂Cranelift IR
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help