Simple trick to increase coverage: Lying to users about signal strength
nickvsnetworking.com·1d
📼Cassette Hacking
#16 Pronic, oblong, rectangular numbers.... Etymology and History of Math Terms
pballew.blogspot.com·26m·
λLambda Encodings
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.com·12h
🏺Kerberos Archaeology
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·15h
🔓Hacking
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·9h
🎫Kerberos Attacks
Controlling atomic interactions in ultracold gas 'at the push of a button'
phys.org·15h
⚛️Quantum Tape
Investigating targeted “payroll pirate” attacks affecting US universities
microsoft.com·1d
🎯NTLM Attacks
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4d
🔐Cryptographic Archaeology
[P] Lossless compression for 1D CNNs
reddit.com·20h·
📊Quantization
Fully Configurable Open Source Audio Spectrum Analyzer
dev.to·2d·
Discuss: DEV
🌈Spectral Audio
Malware apps posing as free VPNs are on the rise
engadget.com·12h
🛡️eBPF Security
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·16h·
Discuss: Hacker News
🎫Kerberos Exploitation
FramePack Studio
framepack.studio·21h·
Discuss: Hacker News
🎬WebCodecs
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics
Enhancing Underwater Acoustic Communication via Adaptive Beamforming and Deep Learning Noise Cancellation
dev.to·1d·
Discuss: DEV
🎧Learned Audio
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·16h
🔓Hacking
Compliance of mobile games with loot box probability disclosure law in Korea
sciencedirect.com·1d·
Discuss: Hacker News
⚖️Game Preservation Ethics
🧠 Real-Time Smart Speech Assistant with Python, Whisper & LLMs
dev.to·10h·
Discuss: DEV
🎙️Whisper
Use the 'Production Effect' to Study More Effectively
lifehacker.com·18h
👂Psychoacoustics
More on Carmichael
johndcook.com·1d·
Discuss: Hacker News
🔢Reed-Solomon Math