WEST Office Hour – November 13th, from 10am-11am PT
cdlib.orgΒ·21h
πŸ•ΈοΈWARC Archives
Flag this post
Book Review: "What Got You Here, Won't Get You There"
lockboxx.blogspot.comΒ·15hΒ·
🎯Content Recommendation
Flag this post
A first look at the adoption of BGP-based DDoS scrubbing services: A five-year longitudinal analysis
blog.apnic.netΒ·1d
πŸ›£οΈBGP Hijacking
Flag this post
Dissecting my MiniBanners program – part 1
subethasoftware.comΒ·2d
πŸ“ΊVT100
Flag this post
Black Swans in OSINT: Why We Keep Missing the Impossible
dutchosintguy.comΒ·2d
πŸ“ŸTerminal Forensics
Flag this post
Query Compilation Isn't as Hard as You Think
databasearchitects.blogspot.comΒ·2hΒ·
πŸ—οΈCompiler Archaeology
Flag this post
[Deep Dive] How We Solved Poker: From Academic Bots to Superhuman AI (1998-2025)
gist.github.comΒ·12hΒ·
Discuss: r/programming
πŸ”²Cellular Automata
Flag this post
Reviving a MacBook Air with Fedora Silverblue
taoofmac.comΒ·16hΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Flag this post
Stop vibe coding your unit tests
andy-gallagher.comΒ·21hΒ·
Discuss: Hacker News
πŸ›Fuzzing
Flag this post
Atomically accurate de novo design of antibodies with RFdiffusion
nature.comΒ·21hΒ·
Discuss: Hacker News
🧬Copy Number Variants
Flag this post
A Hacker’s Journey to NASA’s Hall of Fame
infosecwriteups.comΒ·3d
πŸ”“Hacking
Flag this post
Building PRRover: A FastAPI GitHub PR Reviewer with Telex A2A Integration
dev.toΒ·2dΒ·
Discuss: DEV
⚑gRPC
Flag this post
Geometric Data Valuation via Leverage Scores
arxiv.orgΒ·1d
πŸŒ€Differential Geometry
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.orgΒ·3d
πŸ”Vector Forensics
Flag this post
Encryption is under attack – but it's "vital for law enforcement," said former US investigator
techradar.comΒ·6d
πŸ”“Hacking
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.comΒ·27m
πŸ“‘Feed Security
Flag this post
The Unseen Engine: How Enterprise Data Management Fuels Modern Business
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”—Data Provenance
Flag this post
Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered
blog.checkpoint.comΒ·2d
🏺Kerberos Archaeology
Flag this post
Automated Spectral Artifact Correction via Multi-Modal Data Fusion and Bayesian Optimization in Cuvette Microscopy
dev.toΒ·2dΒ·
Discuss: DEV
πŸ’ΏOptical Forensics
Flag this post