Why Your Password Storage is Fine, But Your File Checksum is Obsolete
dev.to·2d·
Discuss: DEV
Checksum Validation
pgtricks – two tools for backing up PostgreSQL database dumps
github.com·46m·
Discuss: Hacker News
🌳Git Internals
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
DupeGuru lets you quickly find and remove duplicate files from your drives
techspot.com·1d
🔄Content Deduplication
Three ways formally verified code can go wrong in practice
buttondown.com·2h
📜Proof Carrying Code
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·15h
🔗Graph Isomorphism
The Why of PGP Authentication
articles.59.ca·6h
🔑Cryptographic Protocols
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🔐PKI Archaeology
7-Zip: Information on closed security gaps available
heise.de·8h
💣ZIP Vulnerabilities
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ing·11h
🏺ZIP Archaeology
APRS over LoRa with RNode | unsigned.io
unsigned.io·8h
📻Homebrew Protocols
Running new applications on old glibc
lightofdawn.org·1d·
Discuss: Hacker News
🔗Static Linking
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·19h·
Discuss: Hacker News
🔢Reed-Solomon Math
We Benchmarked DuckDB, SQLite, and Pandas on 1M Rows: Here’s What Happened
kdnuggets.com·5h
💾SQLite
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.com·1d
🔍Binary Forensics
Sorting encrypted data without decryption: a practical trick
dev.to·4h·
Discuss: DEV
🔐Hash Functions
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
Imagery HTB WriteUp: Season 9 Machine 2
infosecwriteups.com·1d
📟Terminal Forensics