APRS over LoRa with RNode | unsigned.io
unsigned.io·16h
📻Homebrew Protocols
Evolution of Apple Security Bounty Program
mjtsai.com·6h
🛡️RISC-V Security
Is the End of Detection-Based Security Here?
thenewstack.io·10h
🎯Threat Hunting
Product comparison: Detectify vs. Tenable
blog.detectify.com·19h
🎯Threat Hunting
Codeminer42 Dev Weekly #82
blog.codeminer42.com·9h
🎯Gradual Typing
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·1d·
Discuss: Hacker News
🌊Stream Processing
Experimenting with ACL2 and Claude Code
mikedodds.org·14h·
Discuss: Hacker News
👑Isabelle
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.to·4h·
Discuss: DEV
⚙️Proof Engineering
Ghosts in the Code: A Memorial Grove for Deleted AI
connectingminds.uk·1d·
Discuss: DEV, Hacker News
🏺Protocol Archaeology
More on Carmichael
johndcook.com·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
The Linus Method: How we simiplifed RFC reviews
devashish.me·10h·
Discuss: Hacker News
⚙️Proof Engineering
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·12h·
Discuss: Hacker News
🎫Kerberos Exploitation
Progress being made in porting AMD OpenSIL Turin PoC to Coreboot in a Gigabyte MZ33-AR1
blog.3mdeb.com·6h·
🖥️Terminal Renaissance
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🔐Capability Systems
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·22h
🔗Graph Isomorphism
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.com·3d·
💿ZFS Internals
I Built My Own Google Drive
lorbic.com·1d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
A new breed of analyzers
daniel.haxx.se·14h·
🐛Fuzzing
Ship Broken Things
matmul.net·1d·
Discuss: Hacker News
🔗Topological Sorting