Show HN: Anonymous Peer to Peer Therapy
apps.apple.com·18h·
Discuss: Hacker News
🔐Cryptography
Flag this post
#TIL: Watermarks
thomasrigby.com·9h
🔐Cryptography
Flag this post
Announcing New Compliance Packs for CIS, NIST, and PCI DSS
pulumi.com·22h
🌐Network Security
Flag this post
Emotionally intelligent people use 5 short phrases to strengthen relationships
fastcompany.com·12h
🔤c
Flag this post
Should you let Chrome store your driver’s license and passport?
malwarebytes.com·9h
🐧Linux
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.com·1d·
Discuss: Hacker News
🔐Cryptography
Flag this post
No vigilante justice: Police after far-right group blames A'dam assault on asylum shelter
nltimes.nl·8h
🔤c
Flag this post
Flock haters cross political divides to remove error-prone cameras
arstechnica.com·6h·
Discuss: Hacker News
🌐Network Security
Flag this post
Securing the Open Android Ecosystem with Samsung Knox
thehackernews.com·11h
🌐Network Security
Flag this post
AI App Spending Report: Where Are the Security Tools?
darkreading.com·1d
🌐Network Security
Flag this post
Code Smell 313 - Workslop Code
dev.to·1d·
Discuss: DEV
🔧Assembly Language
Flag this post
Setting Up Your Command Line Assistant with Google Services (The Complete Guide)
dev.to·1d·
Discuss: DEV
🐧Linux
Flag this post
Two-Parameter R\'enyi Information Quantities with Applications to Privacy Amplification and Soft Covering
arxiv.org·18h
🔐Cryptography
Flag this post
Crypto Long & Short: Redefining the Custody Standard for Banking
coindesk.com·5h
🔐Cryptography
Flag this post
Session prepares to weaken file encryption
discuss.privacyguides.net·9h
🔐Cryptography
Flag this post
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
thehackernews.com·8h
🛡️Cybersecurity
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·3d
Systems Programming
Flag this post
Extend Red Hat Lightspeed client to execute custom automation
developers.redhat.com·1d
🐧Linux
Flag this post
Ditch the Config Chaos: Meet Kiponos - the Real-Time Config Revolution You've Been Waiting For
dev.to·2h·
Discuss: DEV
Systems Programming
Flag this post
OpenAI API moonlights as malware HQ in Microsoft’s latest discovery
theregister.com·1d
🌐Network Security
Flag this post