“On Being Watched from Above,” by Carolyn Forché
newyorker.com·16h
🔐Cryptography
Flag this post
Musk's XChat is Safe as "Bitcoin-style" peer-to-peer encryption?
pbxscience.com·7h·
Discuss: Hacker News
🔐Cryptography
Flag this post
Speedrunning an RL Environment
sidb.in·2d·
Discuss: Hacker News
🛡️Cybersecurity
Flag this post
jlesage/docker-jdownloader-2
github.com·2h
🐧Linux
Flag this post
The Curious Case of the Bizarre, Disappearing Captcha
wired.com·16h·
🌐Network Security
Flag this post
5 things I do to protect my home lab from potentially malicious services
xda-developers.com·3d
🐧Linux
Flag this post
The Art of the Do-Over: Designing Idempotent Jobs as a Journey to Peace of Mind
dev.to·4h·
Discuss: DEV
Systems Programming
Flag this post
Password manager KeePass 2.60 is now available: here is what is new
ghacks.net·16h
🌐Network Security
Flag this post
You can't cURL a Border
drobinin.com·3h·
Discuss: Hacker News
🔤c
Flag this post
How to Build a User Authentication System
dev.to·20h·
Discuss: DEV
🌐Network Security
Flag this post
Okta notification on chrome requesting ability to scan local network - is this safe?
reddit.com·17h·
Discuss: r/privacy
🌐Network Security
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
riptides.io·11h·
Discuss: r/node
🌐Network Security
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonw.substack.com·1d·
Discuss: Substack
🛡️Cybersecurity
Flag this post
How to Make Zoom Meetings More Secure and Protect Your Privacy
blogger.com·2d
🌐Network Security
Flag this post
XWiki SolrSearch Exploit Attempts (CVE-2025-24893) with link to Chicago Gangs/Rappers, (Mon, Nov 3rd)
isc.sans.edu·13h
🛡️Cybersecurity
Flag this post
3rd November – Threat Intelligence Report
research.checkpoint.com·17h
🌐Network Security
Flag this post
RP2350 hacking challenge 2: into extra time
raspberrypi.com·17h
🔐Cryptography
Flag this post
HTB: Store
0xdf.gitlab.io·4d
🐧Linux
Flag this post