Show HN: MyPasswordChecker – Quantum & Free Password Strength Checker
mypasswordchecker.com·2d·
Discuss: Hacker News
🧠Logic Puzzles
Flag this post
The Blaze: We've Identified the J6 Pipe Bomber and It's a Government Worker at a Three-Letter Agency
acecomments.mu.nu·10h
💻Tech
Flag this post
Making my own little old school survival horror game :)
v.redd.it·16h·
Discuss: r/godot
🚪Escape Rooms
Flag this post
A coherence-protection scheme for quantum sensors based on ultra-shallow single nitrogen-vacancy centers in diamond
nature.com·1d
💻Tech
Flag this post
What data do coding agents send, and where to?
chasersystems.com·2d·
Discuss: Hacker News
Code Golf
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.net·1d
💻Tech
Flag this post
PCT quantum symmetries -- section
ncatlab.org·18h
🧠Logic Puzzles
Flag this post
Keeper Security's Industry-First Forcefield™ Protects Against Memory-Based Attacks on Windows Endpoints
prnewswire.com·20h
Code Golf
Flag this post
An ARENA 6.0 Capstone: Model Organism of Encoded Reasoning
lesswrong.com·1d
🧠Logic Puzzles
Flag this post
Happy World Digital Preservation Day!
artefactual.com·9h
🏗System design
Flag this post
urbanadventurer/Android-PIN-Bruteforce
github.com·1d
🚪Escape Rooms
Flag this post
Essential Chunking Techniques for Building Better LLM Applications
machinelearningmastery.com·21h
Code Golf
Flag this post
Comparison on Six Self-Hosted WAF
ly.safepoint.cloud·1d·
Discuss: DEV
💻Tech
Flag this post
AI in App Security: Opportunities and Risks
heise.de·16h
Code Golf
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.au·1d·
Discuss: Hacker News
Code Golf
Flag this post
Why Bcrypt Can Be Unsafe for Password Hashing?
blog.enamya.me·1d·
Discuss: Hacker News
🧩Riddles
Flag this post
Louvre used its own name as password, according to newly reviewed confidential documents
washingtontimes.com·1d
🧩Riddles
Flag this post
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation Framework
arxiv.org·1d
Code Golf
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.edu·1d
💻Tech
Flag this post