Hizbollah-linked groups turn to digital payments for fundraising
ft.comยท1d
๐ŸŒDistributed Hash
Flag this post
Playing Clair Obscur Expedition 33.
netfort.gr.jpยท2d
๐ŸบGaming Archaeology
Flag this post
Disaggregated Routing with SONiC and VPP: Lab Demo and Performance Insights โ€“ Part Two
linux.comยท5d
๐Ÿ“กNetwork Protocol Design
Flag this post
State of the Source at ATO 2025: Sustaining the Open Source Ecosystem
opensource.orgยท8h
๐Ÿ”“Open Source Software
Flag this post
Jackknife Transmittance and MIS Weight Estimation
momentsingraphics.deยท2dยท
Discuss: Hacker News
๐ŸŒˆColor Archaeology
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comยท5d
๐ŸŽซKerberos Attacks
Flag this post
Show HN: Vercel-like deployments on your own VPS
outlap.devยท2dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Flag this post
The Cantor Experiment: Forcing a GPT-5-Class AI to Forget a Century of Math
romainpeter.substack.comยท2hยท
Discuss: Substack
โš”๏ธLean Theorem
Flag this post
More Than 70% of DNS Root Queries Are Junk
pulse.internetsociety.orgยท5dยท
Discuss: Hacker News
๐ŸŒDNS Security
Flag this post
Metropolitan Police hails facial recognition tech after record year for arrests
theregister.comยท9h
โš–๏ธLegal Compliance
Flag this post
Donโ€™t Be Tricked by Open Ports: Unmasking Hidden Cyber Dangers
bitsight.comยท4d
๐Ÿ•ธ๏ธMesh Networking
Flag this post
The Case That A.I. Is Thinking
newyorker.comยท11hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Flag this post
๐Ÿ” ZK Proofs: The Hidden Engine Behind Web3 Privacy
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Hash Chains
Flag this post
Incremental Compilation in Recursiveโ€‘Descent Parser (Roslyn)
langdev.stackexchange.comยท1dยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
Flag this post
Controlling Source Determination with Source Lists
dev.toยท13hยท
Discuss: DEV
๐Ÿ”—Constraint Handling
Flag this post
Search for the Ruby Chalice (1983)
bluerenga.blogยท48m
๐Ÿ”ฒCellular Automata
Flag this post
Spatial Sense: Unleashing Language Models on Location Data by Arvind Sundararajan
dev.toยท1hยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Flag this post
Encryption is under attack โ€“ but it's "vital for law enforcement," said former US investigator
techradar.comยท3d
๐Ÿ”“Hacking
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท4dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post