Principles of Epistemology (2025, essay)
alexpeek.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”€c
Flag this post
The internet was made for privacy
doctorow.medium.comΒ·2d
🌐Network Security
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comΒ·3dΒ·
Discuss: Substack
πŸ”’security
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comΒ·3d
πŸ”’security
Flag this post
How to get the GOT address from a PLT stub using GDB
rafaelbeirigo.github.ioΒ·7hΒ·
Discuss: Hacker News
πŸ”§Assembly Language
Flag this post
πŸ” ZK Proofs: The Hidden Engine Behind Web3 Privacy
dev.toΒ·17hΒ·
Discuss: DEV
πŸ”ŒEmbedded Systems
Flag this post
Parsing with zippers improves parsing with derivatives
dl.acm.orgΒ·14hΒ·
Discuss: Hacker News
πŸ”§Assembly Language
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.comΒ·1dΒ·
Discuss: Hacker News
πŸ”ŒEmbedded Systems
Flag this post
How to Protect Yourself from Deepfake 2FA Bypass: A Complete Guide
eproductempire.blogspot.comΒ·12h
πŸ”’security
Flag this post
Botnet scams: Digital war threatens nation's economy & security
nationthailand.comΒ·2d
🌐Network Security
Flag this post
How to Sort Arrays in Objective-c in 2025?
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”§Assembly Language
Flag this post
Machine Learning Fundamentals: Everything I Wish I Knew When I Started
dev.toΒ·17hΒ·
Discuss: DEV
πŸ“ŠSports Analytics
Flag this post
MCP standard
dev.toΒ·7hΒ·
Discuss: DEV
πŸ”ŒEmbedded Systems
Flag this post
Can Jimbo Fisher, James Franklin or a fast-rising coach fix Auburn? 7 candidates to watch
nytimes.comΒ·3h
πŸ€basketball
Flag this post
Entropy in algorithm analysis
11011110.github.ioΒ·1d
πŸ”ŒEmbedded Systems
Flag this post
Privacy is Value.v2. the Swordsman, the Mage, the Drake, and capturing the 7th Capital
sync.soulbis.comΒ·2d
πŸ”’security
Flag this post
Using β€œibm-granite/granite-speech-3.3–8b” πŸͺ¨ for ASR
dev.toΒ·11hΒ·
Discuss: DEV
πŸ”§Assembly Language
Flag this post
Notes from RIPE 91
blog.apnic.netΒ·3d
🌐Network Security
Flag this post
Signal’s Post-Quantum Cryptographic Implementation
schneier.comΒ·4dΒ·
Discuss: Hacker News
πŸ”’security
Flag this post