Show HN: CyBox Security โ Your Virtual Security Team for the AI Era
๐Hardware Security
Flag this post
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]
๐ขHomomorphic Encryption
Flag this post
10ร Faster Log Processing at Scale: Beating Logstash Bottlenecks with Timeplus
๐Quickwit
Flag this post
When Correct Is Not Safe: Can We Trust Functionally Correct Patches Generatedby Code Agents?
๐ก๏ธAI Security
Flag this post
UK Crime Agency Backs "Upload Prevention" Plan to Scan Encrypted Messages
๐Digital Privacy
Flag this post
Microsoft Patch Tuesday for November 2025, (Tue, Nov 11th)
isc.sans.eduยท1d
๐ฆ
Falco
Flag this post
How to Set Up an Automated WordPress LEMP Server with SSL on AWS (Using Ansible)
๐ Self-Hosting
Flag this post
How good is AI at Hacking AD?
๐eBPF
Flag this post
Reverse Engineering the M1C1 LiDAR: cracking the protocol without documentation
๐Fuzzing
Flag this post
ClickOps, IaC and the Excluded Avocado Middle
devops.comยท1h
๐งDevOps
Flag this post
Can Elon Musk Read Your X Chat Messages?
๐ฌMessagePack
Flag this post
Generalized Security-Preserving Refinement for Concurrent Systems
arxiv.orgยท2d
๐Lock-Free Programming
Flag this post
A Brief Look at FreeBSD
๐งLinux
Flag this post
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
๐Cryptography
Flag this post
The Transformer and the Hash: building blocks of 21st century political science
๐Digital Privacy
Flag this post
Loosely, yet Tightly Coupled
๐Refinement Types
Flag this post
Loading...Loading more...