PaperJet – privacy-first document processing
getpaperjet.comΒ·9hΒ·
Discuss: Hacker News
πŸ’»Programming
Flag this post
Alternate to Chainguard libraries for Python
edu.chainguard.devΒ·23hΒ·
Discuss: r/devops
βš™οΈCompilers
Flag this post
Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack
bespacific.comΒ·18h
🌍Typology
Flag this post
n8n Matrix Display
hackster.ioΒ·1d
πŸ’»Programming
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsΒ·4dΒ·
Discuss: Hacker News
πŸ’»Programming
Flag this post
Hackean la Oficina de Presupuesto del Congreso de EE.UU. y sospechan que China estΓ‘ detrΓ‘s del ciberataque
krdo.comΒ·16h
🌍Typology
Flag this post
🎲 Container Escapes 101 - Kernel resource sharing
some-natalie.devΒ·12h
πŸ’»Programming
Flag this post
Understanding prompt injections: a frontier security challenge
openai.comΒ·10h
πŸ’»Programming
Flag this post
Two easy digital intentionality practices
lesswrong.comΒ·6h
πŸ’»Programming
Flag this post
MichaelAI vs. CogniFlow: A Developer's No-BS Guide to Enterprise AI Platforms
getmichaelai.comΒ·1dΒ·
Discuss: DEV
βš™οΈCompilers
Flag this post
Random access Bell game by sequentially measuring the control of the quantum SWITCH
arxiv.orgΒ·17h
πŸ”’Mathematical Puzzles
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toΒ·3dΒ·
Discuss: DEV
πŸ’»Programming
Flag this post
Krylov Complexity Meets Confinement
arxiv.orgΒ·17h
πŸ”’Mathematical Puzzles
Flag this post
Everything You Need to Know to Start Your Way as a Programmer
dev.toΒ·2dΒ·
Discuss: DEV
πŸ’»Programming
Flag this post
πŸ›‘οΈ **2026 Enterprise Cyber Resilience Strategy: AI-Powered, Breach-Proof, Future-Ready** πŸ›‘οΈ
dev.toΒ·5hΒ·
Discuss: DEV
πŸ’»Programming
Flag this post
Signal Private Messenger Crypto Algorithm Double to Triple
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’Mathematical Puzzles
Flag this post
The 1337 PNG Hashquine (2022)
hackaday.comΒ·3dΒ·
Discuss: Hacker News
🧩Puzzles
Flag this post
secretapi - a very lightweight app for securely sharing short-lived, one-time-read secrets
reddit.comΒ·1hΒ·
Discuss: r/selfhosted
πŸ’»Programming
Flag this post
Integrity Under Siege: A Rogue gNodeB's Manipulation of 5G Network Slice Allocation
arxiv.orgΒ·1d
πŸ’»Programming
Flag this post