Signed URLs for Embedded Devices
blog.golioth.io·14h·
Discuss: Hacker News
🛡️Capability VMs
Navigating SEBI’s Cloud Security Requirements: A Guide for Regulated Entities
blog.qualys.com·16h
🛡️Security Type Systems
Supabase Security Best Practices: Common Misconfigurations We Keep Seeing
pentestly.io·2d·
Discuss: r/programming
Configuration Validation
User Agreement
accesswdun.com·1d
🔐Ownership Types
Summary of a new DeepMind paper
marginalrevolution.com·3h
📏Linear Memory
How To Choose A Strong Password - KachTech Media
kachwanya.com·1d
🔐Security Types
Simplifying If Statements with Binary Algebra
dev.to·1h·
Discuss: DEV
🔀Control Structures
Are cloud providers neglecting security to chase AI?
infoworld.com·23h
🏰Capability Machines
Why You Need Phishing Resistant Authentication NOW., (Tue, Sep 16th)
isc.sans.edu·14h
🛡️Parser Security
TᑌᑎEᗪ ᗪᗩEᗰOᑎ Iᑎ ᒪIᑎᑌ
dev.to·18h·
Discuss: DEV
📊perf Tools
The Linux Gatekeeping has to stop
reddit.com·3h·
Discuss: r/linux
🌱Forth Kernels
AI: from technology myth to security alarm
bjreview.com·1d
🛡️Security Type Systems
RFS for AI Alignment
fiftyyears.com·1d·
Discuss: Hacker News
Effect Inference
From Files to Frameworks: Mastering Packages & Modules in OSE
dev.to·2h·
Discuss: DEV
🔧Nickel
Selective Amnesia: Erasing AI's Secrets Without Lobotomizing the Brain
dev.to·11h·
Discuss: DEV
🧠Memory Ordering
Privacy Through Perturbation: When 'Wrong' Makes AI Right
dev.to·17h·
Discuss: DEV
🏰Capability Machines
Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised
dev.to·6h·
Discuss: DEV
🌐WASM Runtimes
Building Extendable CRUD: How I Use Admiral to Create Flexible Admin Interfaces
github.com·10h·
Discuss: DEV
📦Monorepos