ELA-1575-1 libarchive security update
freexian.com·6h
⛳Code Golf
Flag this post
University of Galway and EY collaborate on cyber education programme
siliconrepublic.com·2h
🚪Escape Rooms
Flag this post
Football Daily | Turn up the Jaws soundtrack: the Premier League title chase is on
theguardian.com·1d
💻Tech
Flag this post
A Deep Dive into the Morris Worm
💻Tech
Flag this post
These Israeli Founders Built A $330 Million AI Hacking Startup In Just 5 Months
forbes.com·4h
🚪Escape Rooms
Flag this post
[MODPOST] 1950 Small Wars
🧩Riddles
Flag this post
<span class="nop nop-start">1/ </span> To the doomsayers warning "don't attack the BBC, you will miss it when it is gone", I say this. It has been gone for me f...
threadreaderapp.com·1d
🧩Riddles
Flag this post
How I Used WireGuard to Secure API Communication Between Cloud Servers — Plus a PyAirbyte Custom Connector Tutorial
⛳Code Golf
Flag this post
Structural sign herdability of linear time-invariant systems:theory and design for arbitrary network structures
arxiv.org·12h
🏗System design
Flag this post
Mysterious holes in Andean mountain may be an Inca spreadsheet
newscientist.com·1d
🧩Riddles
Flag this post
You’ve authenticated your user, but have you authorized your agent?
blog.logrocket.com·1d
⛳Code Golf
Flag this post
You Can't Unbake a Cake (or Why Data Isolation in the Age of AI is BASICALLY Impossible)
🏗System design
Flag this post
Designing Blockchain #2: Accounts and State
⛳Code Golf
Flag this post
AI agents open door to new hacking threats
bangkokpost.com·14h
🚪Escape Rooms
Flag this post
Why Language Models Are “Lost in the Middle”
pub.towardsai.net·19h
⛳Code Golf
Flag this post
Personality over Precision: Exploring the Influence of Human-Likeness on ChatGPT Use for Search
arxiv.org·12h
⛳Code Golf
Flag this post
Loading...Loading more...