Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
Notes on strategy and audience as a media business
baldurbjarnason.com·18h
📰Feed Readers
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
⚡Hardware Transactional Memory
Flag this post
Thought Engineering
🧠Intelligence Compression
Flag this post
Fungus: The Befunge CPU(2015)
⚡Homebrew CPUs
Flag this post
Modern Perfect Hashing
🧪Binary Fuzzing
Flag this post
Challenging the Fastest OSS Workflow Engine
🔄Sync Engine
Flag this post
There’s Nothing Boring About Web Search on Retro Amigas
hackaday.com·22h
🕹️Retro Gaming
Flag this post
Proton's new observatory reveals over 100 billion records breached - here's what you need to know
techradar.com·12h
🔐Archive Cryptanalysis
Flag this post
Neither Consent nor Property: A Policy Lab for Data Law
arxiv.org·1d
🧲Magnetic Philosophy
Flag this post
What's In My Human Feedback? Learning Interpretable Descriptions of Preference Data
arxiv.org·1d
🎛️Feed Filtering
Flag this post
Loading...Loading more...