Is Discord safe? Depends how you use it
protonvpn.comยท10h
๐Ÿ”’security
Flag this post
What does it mean to be โ€œSafer with Yealinkโ€?
techzine.euยท10h
๐Ÿ”’security
Flag this post
Free, online, no download, music tab player, for all musicians using apps like songsterr, yousician and ultimate guitar.
gprotab.netยท6hยท
Discuss: r/Piracy
๐Ÿ”’security
Flag this post
A Guide to My Organizational Workflow
cachestocaches.comยท23hยท
Discuss: Hacker News
โšกSystems Programming
Flag this post
NZ - AU : IREN Reports Q1 FY26 Results | LiveNews . co . nz
livenews.co.nzยท1h
๐Ÿ”ŒEmbedded Systems
Flag this post
Defining Types for a Simple HTTP Server
mmhaskell.comยท3d
๐Ÿ”’security
Flag this post
How phosphorylation helps ward off defects during reproduction
phys.orgยท1d
โšกSystems Programming
Flag this post
MAGIC Private AI for Legal Offers Pre-Built Agentic Systems That Run Locally, Protecting Data and Model Execution
prnewswire.comยท9h
๐ŸŒNetwork Security
Flag this post
Code research projects with async coding agents like Claude Code and Codex
simonwillison.netยท7hยท
โšกSystems Programming
Flag this post
Bundestag: Police May Hunt ATM Burglars with State Trojans
heise.deยท1h
๐Ÿ”’security
Flag this post
The Quantum Threat Nobody's Taking Seriously (But Should)
myitbasics.comยท4dยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Building Sustainable Business Models for Pump.fun Projects in 2025
dev.toยท44mยท
Discuss: DEV
๐Ÿ”ŒEmbedded Systems
Flag this post
AI Security: Defining and Defending Cybersecurityโ€™s Next Frontier
sentinelone.comยท1d
๐ŸŒNetwork Security
Flag this post
Building Innovative Tech Solutions: My Journey from Full Stack Developer to Community-Focused Apps
dev.toยท7hยท
Discuss: DEV
๐Ÿ”ŒEmbedded Systems
Flag this post
The kgateway vulnerabilities explained (and why I disagree on its score!)
dev.toยท5hยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Molecular Alchemy: AI-Powered Design of Novel Compounds by Arvind Sundararajan
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒEmbedded Systems
Flag this post
Session Messenger prepares to weaken file encryption
discuss.privacyguides.netยท1d
๐Ÿ”’security
Flag this post
Identical particles as a genuine non-local resource
nature.comยท1d
๐Ÿ”ŒEmbedded Systems
Flag this post
A security model for systemd
lwn.netยท1dยท
Discuss: Hacker News
๐ŸงLinux
Flag this post
Q-Sat AI: Machine Learning-Based Decision Support for Data Saturation in Qualitative Studies
arxiv.orgยท1d
๐Ÿ“ŠSports Analytics
Flag this post