Adaptive Environmental Monitoring and Smart Access Control
hackster.ioยท4h
๐Ÿ Home Automation
From legacy to liability: New research report on end-of-life assets
runzero.comยท1d
๐Ÿ Homelab Archaeology
Preparing for a quantum-safe future should begin today
techradar.comยท2d
๐Ÿ”Quantum Security
Best open source auth tools
cerbos.devยท9h
๐Ÿ”Capability Systems
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.orgยท11h
๐Ÿ”Quantum Security
Privacy-Preserving Federated Learning with Homomorphic Encryption for Secure Medical Image Segmentation
dev.toยท17hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Your Next Innovation Is Already in Your Data
exoscale.comยท2d
๐ŸŒŠStreaming Systems
The Storage Fix DevOps Has Been Waiting For
backblaze.comยท12h
๐Ÿ’พPersistence Strategies
CTFs as a Rosetta Stone
bhmt.devยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
FPGA Security Features
controlpaths.comยท1dยท
Discuss: Hacker News
๐ŸŒŠStream Ciphers
When we can verify a person but recognize nothingโ€“what are we authenticating?
syntheticauth.aiยท15hยท
Discuss: Hacker News
๐Ÿ“ผCassette Hacking
CDC File Transfer
github.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฆContent Addressable
Fuzzypass: Hacking Your Brain to Remember 100 Bits of Entropy
lockeidentity.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
PUL-Inter-slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks
arxiv.orgยท42m
๐ŸŽฏThreat Hunting
Wombat's Book of Nix
mhwombat.codeberg.pageยท9hยท
โ„nix
Master Crypto Security: Your Complete Guide to Safe Wallet Management
hackernoon.comยท2d
๐Ÿ”—Hash Chains
Nine HTTP Edge Cases Every API Developer Should Understand
blog.dochia.devยท16hยท
โœ…Format Verification
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.eduยท2d
๐Ÿ”“Password Cracking
Kubernetes Orchestration is More Than a Bag of YAML
yokecd.github.ioยท16hยท
๐ŸŒŠStreaming Systems