AI-Deployable STM32N6 Open-Source Edge AI Camera
hackster.ioยท3h
๐ฆพARM Cortex-M
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท3d
๐BGP Security
Flag this post
A/B Testing Could Lead LLMs to Retain Users Instead of Helping Them
๐Concolic Testing
Flag this post
Stop Making Your Team Figure Out AI on Their Own
nngroup.comยท2d
โกProof Automation
Flag this post
Ask HN: Would you trust an AI that sees and hears everything you do?
๐ Homelab Archaeology
Flag this post
How I Used Sequential IDs to Download an Entire Companyโs User Database (And The Joker Helped)
infosecwriteups.comยท1h
๐Hacking
Flag this post
The AI Monetization Playbook
๐คAI Curation
Flag this post
Show HN: KeyLeak Detector โ Scan websites for exposed API keys and secrets
๐ฆ Malware Analysis
Flag this post
Building Syllabi โ Agentic AI with Vercel AI SDK, Dynamic Tool Loading, and RAG
โกProof Automation
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.orgยท5h
๐งญContent Discovery
Flag this post
Your Lead Funnel is Leaking Junk: 7 Engineering Strategies for High-Quality B2B Prospects
๐Feed Optimization
Flag this post
Encryption is under attack โ but it's "vital for law enforcement," said former US investigator
techradar.comยท2d
๐Hacking
Flag this post
๐ฐ Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools
๐ฅ๏ธModern Terminals
Flag this post
Inferring trust in recommendation systems from brain, behavioural, and physiological data
arxiv.orgยท5h
๐Vector Forensics
Flag this post
Buy Verified Cash App Accounts Online | Fast & Secure with Pvazoneusa
โ
Verification Codecs
Flag this post
๐ฎ Building the Future: Why Developers Are the Architects of a New Tech Civilization
๐Open Source Software
Flag this post
Loading...Loading more...