Finding your path into DFIR
pentestpartners.comยท8h
๐Digital Forensics
Flag this post
Is my data safe if I use Loom??
๐Hardware Security
Flag this post
SailPoint's Second Act
๐ฐTigerBeetle
Flag this post
Comparing ECDSA signature validation in OpenSSL vs. libsecp256k1 - The Stack
delvingbitcoin.orgยท2d
๐ฆProtocol Buffers
Flag this post
The social contract of open source
๐Open Source
Flag this post
After 2 months of coding, debugging, and second-guessing myselfโฆ my first product is live ๐
๐ฌPrompt Engineering
Flag this post
Shannonโs Principle in IoT: Lessons from the Field
blog.devops.devยท10h
๐Information Theory
Flag this post
5 reasons Iโve never used Arch Linux as a daily driver and never will
xda-developers.comยท3d
๐งLinux
Flag this post
Spider-Man: The Movie Game dissection project Checkpoint - November 2025
๐Profiling Tools
Flag this post
Boost Your Websiteโs Security with SafeLine WAF: The Powerful Open-Source Solution You Need
๐ฑProgressive Web Apps
Flag this post
I wrote a short post on the importance of taking the literal perspective on writing scalable code. Code that itself scales over time. Check it out and let me kn...
๐จIncremental Compilation
Flag this post
The Builder's Notes: Your CFO Just Called โ Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.netยท1d
๐ก๏ธAI Security
Flag this post
AI/ML Trends Report
๐ก๏ธAI Security
Flag this post
Quantifying Edits Decay in Fine-tuned LLMs
arxiv.orgยท13h
๐Profile-Guided Optimization
Flag this post
Loading...Loading more...