Things to look forward to
markjgsmith.comยท1d
๐ฏContent Recommendation
Flag this post
Use the 3-2-1 Rule to Back Up All Your Important Files
lifehacker.comยท2d
๐ฟBackup Strategies
Flag this post
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
aws.amazon.comยท1d
๐ณArchive Merkle Trees
Flag this post
No Key, Mo Problems
๐Hash Chains
Flag this post
Cypherpunks Hall of Fame
๐Cryptographic Archaeology
Flag this post
Kyber vs. RSA-2048
๐Quantum Security
Flag this post
OWASP Top 10 tackles supply chain risk
reversinglabs.comยท2d
๐WASM Capabilities
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
๐Dependency Resolution
Flag this post
Three New Organisations Join the Our Future Memory Movement
internetarchive.euยท1d
โ๏ธArchive Ethics
Flag this post
Markdown Is Holding You Back
๐Document Grammar
Flag this post
๐ Unsupervised Learning NO. 507
newsletter.danielmiessler.comยท3d
๐ต๏ธVector Smuggling
Flag this post
X11 Record and Replay
๐บZIP Archaeology
Flag this post
Data General History by Foster
๐Data Provenance
Flag this post
Cryptomator Desktop 1.18.0 is here!
๐บZIP Archaeology
Flag this post
Hacker Review of Ghost in the Shell (1995)
๐Hacking
Flag this post
Show HN: Jsonl Viewer Pro โ Open 5GB Security Logs Instantly on Mac
๐Stream Processing
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐ฏNTLM Attacks
Flag this post
Loading...Loading more...