Running your own HashDB lookup
cyber.wtfยท9h
๐Ÿ”Hash Functions
RFC 677: Maintenance of duplicate databases (1975)
rfc-editor.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
FreeBSD Errata Notice FreeBSD-EN-25:18.freebsd-update
bsdsec.netยท28m
๐ŸกOpenBSD
Enhancing DPP Data Integrity via Federated Learning & Blockchain-Anchored Provenance
dev.toยท9hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.ukยท1d
๐Ÿ’ฟFLAC Archaeology
Fast Data Persistence: GrausDB and Zero-Copy Serialization
rpallas.xyzยท23hยท
Discuss: Hacker News
๐ŸŒณPersistent Data Structures
blog.fsck.comยท13h
โš”๏ธLean Tactics
Master Crypto Security: Your Complete Guide to Safe Wallet Management
hackernoon.comยท5h
๐Ÿ”—Hash Chains
A Programmer's Guide to Logging Best Practices
dash0.comยท3hยท
Discuss: Hacker News
๐Ÿ“Log Parsing
Exploring Data Extraction from iOS Devices: What Data You Can Access and How
blog.digital-forensics.itยท3hยท
๐ŸŽApple Archive
Defending LLM applications against Unicode character smuggling
aws.amazon.comยท55m
๐Ÿ”คCharacter Encoding
Proving the Infinitude of Primes in Knuckledragger
philipzucker.comยท2d
๐ŸงฎTheorem Proving
How We Made SWE-Bench 50x Smaller
logicstar.aiยท10hยท
๐Ÿ“ฆGit LFS
Cryptographic documents in RavenDB
ayende.comยท4d
โœ…Document Verification
A DHT for iroh โ€“ Part 1, The Protocol
iroh.computerยท23hยท
Discuss: Hacker News
๐ŸŒDistributed Hash Tables
Breaking into Password Managers: from Bitwarden to Zoho Vault
blog.elcomsoft.comยท9h
๐Ÿ”“Password Cracking
Edge cases in DNSSEC validation with multiple algorithms
blog.apnic.netยท1d
๐ŸŒDNS Security
Proper services
anarc.atยท2h
๐Ÿ“ŠHomelab Monitoring
CodeQL zero to hero part 5: Debugging queries
github.blogยท1d
๐Ÿ”“Reverse engineering
FAQ: The Shai-hulud npm worm attack explained
reversinglabs.comยท2h
๐Ÿ’ฟWORM Storage