Why Rust's Binary Protection Actually Matters (Yes, Even For You)
dev.to·2h·
Discuss: DEV
🦀Rust Verification
Flag this post
Solving Regex Crosswords with Z3
blog.nelhage.com·1d·
Discuss: Hacker News
🧮Z3 Solver
Flag this post
CodeSOD: A Percentage of Refactoring
thedailywtf.com·1d
Format Verification
Flag this post
Business Logic Testing: Protect Mobile Apps from Exploits and Fraud
nowsecure.com·11h
🧪CBOR Fuzzing
Flag this post
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
botanica.software·8h·
Discuss: Hacker News
🔱Galois Cryptography
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.co·23h
🛡️eBPF Security
Flag this post
Visual Testing in Software – The Problem I Couldn't See
pharzan.com·59m·
Discuss: Hacker News
📊Static Analysis
Flag this post
Optimizing LLM Context for Vulnerability Scanning
blog.fraim.dev·2d·
Discuss: Hacker News
🔓Decompilation
Flag this post
What's new in C# 14: overview
pvs-studio.com·11h·
Discuss: Hacker News
🔗Concatenative Programming
Flag this post
SATisfying Solutions to Difficult Problems!
vaibhavsagar.com·19h·
Discuss: Lobsters
🔗Combinatory Logic
Flag this post
Key Takeaways from the Safety Critical Track at Open Source Summit Europe 2025 – 4
elisa.tech·8h
🔓Open Source Software
Flag this post
Show HN: Bhttp Binary HTTP (RFC 9292) for Go
github.com·6h·
Discuss: Hacker News
🌐Network Protocols
Flag this post
AIxCC curl details
daniel.haxx.se·15h·
Discuss: Hacker News
🛡️WASM Sandboxing
Flag this post
Extracting A Large Corpus from the Internet Archive, A Case Study
journal.code4lib.org·1d
🌐Web Archiving
Flag this post
Show HN: FastQR – A Fast C++ QR Code Generator Supporting Batch Processing
news.ycombinator.com·1d·
Discuss: Hacker News
📱QR Archaeology
Flag this post
An Introduction to JavaScript Expressions
css-tricks.com·4h
🔗Concatenative Programming
Flag this post
Too Many Secrets: Attackers Pounce on Sensitive Data Sprawl
darkreading.com·3h
🔓Hacking
Flag this post
The security paradox of local LLMs
quesma.com·10h·
🔓Hacking
Flag this post