Running your own HashDB lookup
cyber.wtf·4h
🔐Hash Functions
RFC 677: Maintenance of duplicate databases (1975)
rfc-editor.org·1d·
Discuss: Hacker News
🛡️Preservation Proofs
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·1d
💿FLAC Archaeology
Enhancing DPP Data Integrity via Federated Learning & Blockchain-Anchored Provenance
dev.to·5h·
Discuss: DEV
🔗Data Provenance
Fast Data Persistence: GrausDB and Zero-Copy Serialization
rpallas.xyz·19h·
Discuss: Hacker News
🌳Persistent Data Structures
blog.fsck.com·9h
⚔️Lean Tactics
Proving the Infinitude of Primes in Knuckledragger
philipzucker.com·2d
🧮Theorem Proving
How We Made SWE-Bench 50x Smaller
logicstar.ai·5h·
📦Git LFS
Enhancing File Transfer Security with SSH Key Authentication
blog.sucuri.net·10h
🔐Archive Encryption
Cryptographic documents in RavenDB
ayende.com·4d
Document Verification
Breaking into Password Managers: from Bitwarden to Zoho Vault
blog.elcomsoft.com·4h
🔓Password Cracking
A DHT for iroh – Part 1, The Protocol
iroh.computer·18h·
Discuss: Hacker News
🌐Distributed Hash Tables
Edge cases in DNSSEC validation with multiple algorithms
blog.apnic.net·1d
🌐DNS Security
CodeQL zero to hero part 5: Debugging queries
github.blog·21h
🔓Reverse engineering
Inside the Unified Log 3: Log storage and attrition
eclecticlight.co·1d
💾Persistence Strategies
How I Block All 26M of Your Curl Requests
foxmoss.com·17h·
Discuss: Hacker News
🛡️eBPF Programs
SNAPs: Subspace-Native Atomic Pieces
github.com·1d·
Discuss: Hacker News
🌐Edge Preservation
Radicle 1.5.0 – Hibiscus
radicle.xyz·39m·
Discuss: Hacker News
🌳Git Internals
Scattered Spider, ShinyHunters Restructure – New Attacks Underway
securityaffairs.com·5h
📡Feed Security
OpenTofu Introduces Ephemeral Support for Safer Secrets Management
linuxiac.com·1d
🛡️Preservation Proofs