Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท21hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
The Why of PGP Authentication
articles.59.caยท9h
๐Ÿ”‘Cryptographic Protocols
Building Trust for AI Agents โ€” ISM-X: A Privacy-Preserving Identity Layer (with demo)
dev.toยท3hยท
Discuss: DEV
๐Ÿ”PKI Archaeology
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท10h
๐Ÿ Homelab Federation
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท18h
๐Ÿ”—Graph Isomorphism
Three ways formally verified code can go wrong in practice
buttondown.comยท4h
๐Ÿ“œProof Carrying Code
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.ioยท6hยท
๐Ÿ”“Open Source Software
Ensuring Safe and Reliable Updates with Qualys TruRiskโ„ข Manifest Version Control
blog.qualys.comยท1d
โœ…Archive Fixity
When AI Remembers Too Much โ€“ Persistent Behaviors in Agentsโ€™ Memory
unit42.paloaltonetworks.comยท1d
๐Ÿ”ฒCellular Automata
An enough week
blog.mitrichev.chยท1dยท
๐ŸงฎZ3 Solver
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.comยท6h
๐ŸŽฏThreat Hunting
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.securityยท1d
๐Ÿ›ก๏ธeBPF Security
A disenshittification moment from the land of mass storage
doctorow.medium.comยท9h
๐ŸงฒMagnetic Philosophy
Show HN: TrustMesh โ€“ Open-source reputation layer for AI agents
github.comยท8hยท
๐ŸคConsensus Protocols
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.comยท6h
๐Ÿ’ฃZIP Vulnerabilities
Tiga: Accelerating Geo-Distributed Transactions with Synchronized Clocks
muratbuffalo.blogspot.comยท2dยท
๐ŸคDistributed Consensus
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท12h
๐Ÿ”—Hash Chains
go-async, a type-Safe, retryable, and deterministic concurrency for Go
reddit.comยท14hยท
Discuss: r/golang
๐Ÿฆ€Rust Borrowing
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.ioยท1hยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท10h
๐Ÿ”“Hacking