Ashton Wiersdorf On Organizing Papers For Research
irreal.orgΒ·9h
πŸ“„PDF Internals
An Anechoic Chamber at Nokia Bell Labs Reveals the Hidden Sounds of Your Body
scientificamerican.comΒ·1d
πŸ“‘Frequency Archaeology
Oracle investigating extortion emails targeting E-Business Suite customers
cybersecuritydive.comΒ·1d
πŸ”“Hacking
What we’ve been up to: CloudViPER
openpreservation.orgΒ·4d
🏠Homelab Preservation
Why Cinapse Moved Away from CRDTs for Sync
powersync.comΒ·1dΒ·
Discuss: Hacker News
πŸ”€CRDT
How to Get Notified on SSH Logins on Linux
linuxiac.comΒ·3h
πŸ›‘οΈCLI Security
Implementing a Kalman Filter in PostgreSQL to Smooth GPS Data
hackaday.comΒ·1d
πŸ“Range Queries
eHealth: switch to ECC encryption by 2026 causes production stress
heise.deΒ·1d
πŸ”HSM Integration
The Geek Code (1993)
github.comΒ·16hΒ·
Discuss: Hacker News
πŸ“œBinary Philology
How to choose an age verification VPN
techradar.comΒ·3d
πŸ§…Tor Networks
Wine 10.16 Brings Fast NTSync Support
linuxiac.comΒ·7h
πŸ”ŒOperating system internals
Dell quietly made their CSI drivers closed-source. Are we okay with the security implications of this?
reddit.comΒ·1dΒ·
Discuss: r/kubernetes
πŸ”’Hardware Attestation
sentdex: Unitree G1 Security Disaster
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”“Hacking
CLUE: Non-parametric Verification from Experience via Hidden-State Clustering
arxiv.orgΒ·1d
🧠Machine Learning
A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.comΒ·2d
🀝Consensus Algorithms
Preparing for a quantum-safe future should begin today
techradar.comΒ·4d
πŸ”Quantum Security
Educational Byte: What is β€œdusting” in Crypto, or Why Would Someone Send You $0.0001?
hackernoon.comΒ·1d
πŸ”Hash Functions
Top Risks of AI in Cybersecurity and Proven Ways to Reduce Them
dev.toΒ·3dΒ·
Discuss: DEV
🎯Threat Hunting