Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
🔐Hardware Security
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
🔗Dependent Types
Flag this post
I've created a leetcode for system design
🎨Design Systems
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
🔓Binary Exploitation
Flag this post
Video Invisible Watermarking at Scale
🎬WebCodecs
Flag this post
Geometric Data Valuation via Leverage Scores
arxiv.org·14h
💰TigerBeetle
Flag this post
Inside Pinecone: Slab Architecture
📋Columnar Storage
Flag this post
Russian spies pack custom malware into hidden VMs on Windows machines
🔓Binary Exploitation
Flag this post
Dive into Systems
⚙️Systems Programming
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
🛡️AI Security
Flag this post
Split Learning-Enabled Framework for Secure and Light-weight Internet of Medical Things Systems
arxiv.org·1d
📱Edge AI
Flag this post
Loading...Loading more...