XTXMarkets/ternfs: A distributed file system
github.comยท35m
๐Ÿ—„๏ธFile Systems
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Enter Sandbox 30: Static Analysis gone wrong
hexacorn.comยท8h
๐Ÿ”Binary Forensics
Codeminer42 Dev Weekly #79
blog.codeminer42.comยท15h
๐Ÿ’ฟZFS Archaeology
Intuitions Behind the Range Proofs of Bulletproof
cryptologie.netยท1d
๐ŸŽฏProof Tactics
GPU Accelerated Zero-Knowledge Proving by Developerayo
blog.shodipoayomide.comยท1dยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
The Ternary Manifesto
homepage.cs.uiowa.eduยท2d
๐Ÿ“Concrete Syntax
Lethal Trifecta โ€“ Using Notion AI's Web Search Tool to Leak Private Notion Pages
codeintegrity.aiยท13hยท
๐ŸŽซKerberos Exploitation
Real-World Network Setups that Hackers Love | Cyber Codex
infosecwriteups.comยท6h
๐Ÿ”“Hacking
How we built a flywheel to steadily improve security for Amazon RDS
aws.amazon.comยท2d
๐Ÿ‘๏ธObservatory Systems
How to join the desync endgame: Practical tips from pentester Tom Stacey
portswigger.netยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
This Week in Security: The Shai-Hulud Worm, ShadowLeak, and Inside the Great Firewall
hackaday.comยท16h
๐Ÿ”“Hacking
Bazel and glibc versions
jmmv.devยท23h
๐Ÿ”—Dependency Resolution
IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.orgยท4dยท
Discuss: Hacker News
๐Ÿ“‹Format Specification
Use mutation testing to find the bugs your tests don't catch
blog.trailofbits.comยท1d
๐ŸงชProperty-Based Testing
Fortra addressed a maximum severity flaw in GoAnywhere MFT software
securityaffairs.comยท13h
๐Ÿ”“Hacking
MCP Tools: Attack Vectors and Defense Recommendations for Autonomous Agents
elastic.coยท1d
๐ŸงชProtocol Fuzzing
ChatGPT Deep Research zero-click vulnerability fixed by OpenAI
malwarebytes.comยท18h
๐Ÿ”’Language-based security