Strong Authentication in a Post-Quantum World
kuppingercole.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Cryptography
Flag this post
New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
eprint.iacr.orgยท1d
๐Ÿ“กSide-Channel Attacks
Flag this post
OpenAPI won't make your APIs AI-ready. But Arazzo can
bump.shยท1hยท
Discuss: Hacker News
โœ…Formal Methods
Flag this post
The Write Last, Read First Rule
tigerbeetle.comยท15hยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
The Spegling Chronicles: Measuring dev shadow work until it measured us back
medium.comยท2hยท
Discuss: Hacker News
๐Ÿ›Vulnerability Research
Flag this post
Fil-C
graydon2.dreamwidth.orgยท16hยท
๐Ÿ›Vulnerability Research
Flag this post
Mathematical exploration and discovery at scale
terrytao.wordpress.comยท12hยท
Discuss: Hacker News
๐Ÿ›Vulnerability Research
Flag this post
What does the ideal information environment look like?
defenderofthebasic.substack.comยท2dยท
Discuss: Substack
๐Ÿ“กSide-Channel Attacks
Flag this post
Show HN: Refusal-Aware Logical Framework for LLMs
github.comยท2dยท
Discuss: Hacker News
โœ…Formal Methods
Flag this post
Can a Startup Beat a Giant? When the Perplexity Case Isn't So Easy
news.ycombinator.comยท12hยท
Discuss: Hacker News
๐Ÿ”’Cryptography
Flag this post
A Deep Dive into the Morris Worm
rapid7.comยท9hยท
Discuss: Hacker News
๐Ÿ›Vulnerability Research
Flag this post
Low-Level Hacks
blog.raycursive.comยท2dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
cloud.google.comยท1dยท
Discuss: Hacker News
๐Ÿ›Vulnerability Research
Flag this post
Handling Noisy Plaintext Checking Oracles with SPiRiT
eprint.iacr.orgยท23h
๐Ÿ“กSide-Channel Attacks
Flag this post
The Complexity Cliff: Why Reasoning Models Work Right Up Until They Don't
rewire.itยท15hยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Switching from GPG to Age
luke.hsiao.devยท22hยท
Discuss: Hacker News
๐Ÿ›Vulnerability Research
Flag this post
A PoC to make a backdoored PyTorch neural network
hacktelligence.orgยท16hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.orgยท1dยท
Discuss: Hacker News
๐Ÿ›Vulnerability Research
Flag this post
Embedding TypeScript
andrews.substack.comยท5hยท
โœ…Formal Methods
Flag this post
Building our geospatial database in production
radar.comยท1dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post