A Tale of Two Leaks: How Hackers Breached the Great Firewall of China (39c3)
cdn.media.ccc.de·10h
Introducing the XLab AI Security Guide
lesswrong.com·7h
Fuzzing.in
fuzzing.in·1h
🎲 WebAuthn Won't Be Usable Because It Is Not Designed for the Web
codingotaku.com·8h
To sign or not to sign: Practical vulnerabilities in GPG & friends (39c3)
cdn.media.ccc.de·5h
Guix Tricks: Managing secrets using password-store and run-time decryption scripts.
freakingpenguin.com·9h
Hacking washing machines (39c3)
cdn.media.ccc.de·1h
Are We In A Coding Overhang?
lesswrong.com·16h
Loading...Loading more...