AI Principles for Digital Forensics and Investigations (DFIR)
cybertriage.comยท2d
๐Ÿ”Vector Forensics
DeepSeek browser testing with claude-cli and chrome-devtools-mcp
circusscientist.comยท5h
๐Ÿš€Indie Hacking
Daniel Stenberg's note on AI assisted curl bug reports
simonwillison.netยท1d
๐Ÿš€Indie Hacking
Crowdsourced AI += Exodia Labs
blog.virustotal.comยท2dยท
๐Ÿš€Indie Hacking
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.ukยท5d
๐Ÿ’ฟFLAC Archaeology
AI in Digital Forensics: a Tool, not an Oracle
blog.elcomsoft.comยท17h
๐Ÿ‘‚Audio Evidence
Fuzzypass: Hacking Your Brain to Remember 100 Bits of Entropy
lockeidentity.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
linux.slashdot.orgยท1d
๐Ÿ“ŸTerminal Forensics
Node.js Performance: Processing 14GB Files 78% Faster with Buffer Optimization
pmbanugo.meยท2dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Securing AI agents at the scale of the internet
godaddy.comยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Delimited Continuations in Lone Lisp
matheusmoreira.comยท19hยท
Discuss: Hacker News
๐Ÿ”—Lisp
Jason Brown: Self-Development as the Key to Unlocking New Heights in Business and Life
hackernoon.comยท10h
๐Ÿ”“Open Source Software
UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft
darkreading.comยท12h
๐Ÿ”“Hacking
Geometric Structures and Patterns of Meaning: A PHATE Manifold Analysis of Chinese Character Embeddings
arxiv.orgยท21h
๐Ÿ“Geometric Hashing
Why Claude Code's Unix Philosophy Beats Other AI Assistants
dev.toยท1dยท
Discuss: DEV
๐Ÿ—๏ธCompiler Archaeology
Why Debugging Your Life Feels Like Debugging Code
dev.toยท18hยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Density-Ratio Weighted Behavioral Cloning: Learning Control Policies from Corrupted Datasets
arxiv.orgยท21h
๐Ÿง Machine Learning
A gentle introduction to GEMM using MMA tensor cores
am17an.bearblog.devยท1dยท
Discuss: Hacker News
๐Ÿ“ŠRISC-V Vectors
AI Lessons Learned
dev.toยท2dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Google warns of Cl0p extortion campaign against Oracle E-Business users
securityaffairs.comยท19h
๐ŸŽซKerberos Attacks