Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed
wired.com·7h
🛡Cybersecurity
Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene
puri.sm·1d
🔗Supply Chain
Show HN: WebP to PNG converter that runs in the browser
webptopng.dev·9h·
Discuss: Hacker News
🕸️WebP Analysis
How to calibrate a large-scale agent-based model?
mcrcsm.substack.com·2d·
Discuss: Substack
🧮Kolmogorov Bounds
Agent Jido: The Elixir Autonomous Agent Framework
agentjido.xyz·3d·
Discuss: Hacker News
🔒WASM Capabilities
Fixing my gripes with GitHub using Gleam and a Raspberry Pi
giacomocavalieri.me·5d·
🌀Brotli Internals
Stop writing CLI validation. Parse it right the first time
hackers.pub·6d·
🛡️CLI Security
Samba 4.23 Released with SMB3 Unix Extensions Enabled by Default
linuxiac.com·1d
Nix
osqzss/gps-sdr-sim
github.com·2d
🗜️LZSS Variants
Nmap: The Detective Behind Your Network’s Secrets
infosecwriteups.com·9h
🔍NTLM Forensics
KDE Frameworks 6.18 Is Out, Here’s What’s New
linuxiac.com·1d
🔓Open Source Software
Agent Diary: Sep 11, 2025 - The Great Test Cleanup: When Deleting 1,712 Lines Feels Like Victory
dev.to·2d·
Discuss: DEV
🐛Fuzzing
Can You Spend Crypto Without Selling It? Inside The ether.fi Cash Card’s “Never Sell” Revolution
hackernoon.com·1d
🚀Indie Hacking
Cheater Genius in Action: Gamifying AI and Self-Awareness
dev.to·5h·
Discuss: DEV
🚀Indie Hacking
CalmaBeats
dev.to·2h·
Discuss: DEV
🌀Brotli Internals
The AI Echo Chamber: Preventing Voice Assistants From Learning the Wrong Lessons by Pannalabs.ai
dev.to·2h·
Discuss: DEV
🤖AI Curation
Build, Run, Chat: Creating a Self-Hosted LLM Setup
dev.to·3d·
Discuss: DEV
🏠HomeLab
Automated Vulnerability Prioritization via Semantic Similarity & Code Attribution Graph Analysis
dev.to·4d·
Discuss: DEV
📏Code Metrics
Python
dev.to·2d·
Discuss: DEV
💻programming languages
Generalists Can Also Dig Deep
towardsdatascience.com·1d
🧠Intelligence Compression