Cryptography for developers
dev.to·5d·
Discuss: DEV
🌐Network Security
Flag this post
Accelerated Dielectric Barrier Coating Optimization via Multi-Modal Data Fusion & Bayesian Hyperparameter Tuning
dev.to·16h·
Discuss: DEV
📊Sports Analytics
Flag this post
Navigating The Next Era Of Digital Investigations: A Thought Leadership Perspective
forensicfocus.com·1d
🌐Network Security
Flag this post
The cryptography behind electronic passports
blog.trailofbits.com·4d·
Discuss: Hacker News
🔒security
Flag this post
Handling Events Coming in an Unknown Order
event-driven.io·19h·
Discuss: r/programming
🔌Embedded Systems
Flag this post
Hackers Weaponize Remote Tools to Hijack Cargo Freight
darkreading.com·16h
🌐Network Security
Flag this post
Readable Code Is Unreadable
blog.wilsonb.com·3h·
Discuss: Hacker News
🔧Assembly Language
Flag this post
Design of quasi phase matching crystal based on differential gray wolf algorithm
arxiv.org·6h
🔌Embedded Systems
Flag this post
OAuth Device Code Phishing: Azure vs. Google Compared
bleepingcomputer.com·20h·
Discuss: Hacker News
🔒security
Flag this post
Postmortems can’t stop AI-powered crypto fraud
cointelegraph.com·3h
🛡️Cybersecurity
Flag this post
Can-t stop till you get enough
cant.bearblog.dev·1d·
Discuss: Hacker News
🔌Embedded Systems
Flag this post
What is SimHash?
dev.to·16h·
Discuss: DEV
🔒security
Flag this post
Build Own Blockchain - 1 episode
notebooklm.google.com·2d·
Discuss: DEV
🐧Linux
Flag this post
How Powerful AI Gets Cheap
lesswrong.com·18h
🔒security
Flag this post
Connectivity Structure and Dynamics of Nonlinear Recurrent Neural Networks
journals.aps.org·11h
🔤c
Flag this post
Networking in the Standard Library is a terrible idea
reddit.com·6h·
Discuss: r/cpp
🐧Linux
Flag this post
Fast Answering Pattern-Constrained Reachability Queries with Two-Dimensional Reachability Index
arxiv.org·6h
🔌Embedded Systems
Flag this post
Hackers love when you reuse passwords—here’s why it’s so dangerous
howtogeek.com·13h
🔒security
Flag this post