The Much Shortened List of My Distributed Self
zylstra.orgΒ·1d
π Personal Archives
Flag this post
5 ways to strengthen your firewall and endpointβs defenses against ransomware
news.sophos.comΒ·4d
πDNS over QUIC
Flag this post
Get Stronger by Greasing the Groove
πSystems Hardening
Flag this post
What Is a "Why"
π¨Nordic Design
Flag this post
What Past Computing Breakthroughs Teach Us About AI
cacm.acm.orgΒ·2d
π Homelab Archaeology
Flag this post
Lazy Backup (2006)
πDifferential Backup
Flag this post
Making Hosted Control Planes possible with Talos
youtube.comΒ·2d
π Homelab Federation
Flag this post
Leaving PyTorch and Meta
πBrotli Internals
Flag this post
The who, where, and how of APT attacks in Q2 2025βQ3 2025
welivesecurity.comΒ·2d
πOSINT Techniques
Flag this post
Video + notes on upgrading a Datasette plugin for the latest 1.0 alpha
simonwillison.netΒ·3d
πΊZIP Archaeology
Flag this post
How I Automated PDF Stamping with Python to Keep My Documents Authentic
πDocument Digitization
Flag this post
Enea AB (publ) (ENEKF) Discusses Strategic Update and Positioning Amid Geopolitical and Security Trends Transcript
seekingalpha.comΒ·2d
πΈπͺNordic Cryptography
Flag this post
Researchers introduce a new tool for more accurate RNA modification detection from nanopore signals
phys.orgΒ·2d
πBurrows-Wheeler
Flag this post
FBI Subpoenas Registrar for Details on Anonymous Archiving Site Owner
tech.slashdot.orgΒ·3d
π Personal Archives
Flag this post
Stress-Mediated Lithium Anode Degradation Modeling via Finite Element & Phase-Field Coupling
π§²Cassette Physics
Flag this post
A Criminology of Machines
arxiv.orgΒ·3d
π²Cellular Automata
Flag this post
π― Tiger MCP Blew My Mind β Here's the Visual Layer I'm Building to Complete It π
βοΈSQL Archaeology
Flag this post
Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems
securityaffairs.comΒ·2d
π«Kerberos Exploitation
Flag this post
Loading...Loading more...