A Tale of Two Leaks: How Hackers Breached the Great Firewall of China (39c3)
cdn.media.ccc.deยท13h
Introducing the XLab AI Security Guide
lesswrong.comยท10h
๐ฒ WebAuthn Won't Be Usable Because It Is Not Designed for the Web
codingotaku.comยท12h
To sign or not to sign: Practical vulnerabilities in GPG & friends (39c3)
cdn.media.ccc.deยท9h
Flow blockchain exploited for $3.9 million
web3isgoinggreat.comยท4h
Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot (39c3)
cdn.media.ccc.deยท50m
Guix Tricks: Managing secrets using password-store and run-time decryption scripts.
freakingpenguin.comยท12h
The Ephemeral Scrapbook
numericcitizen.meยท13h
Hacking washing machines (39c3)
cdn.media.ccc.deยท4h
Loading...Loading more...