๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

$5 Wrench Attacks: When Cryptocurrency Crime Get Physical
benthamsgaze.orgยท12h
๐Ÿ”“Password Cracking
Evolution in Software: What Has Changed Since GOOS? โ€ข Nat Pryce & Duncan McGregor
youtube.comยท9h
๐Ÿ”ŒInterface Evolution
But will they?
tante.ccยท1d
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
What do I need to do before throwing away old tech?
rnz.co.nzยท2dยท
Discuss: Hacker News
๐Ÿ”Archive Cryptanalysis
Show HN: Bearify โ€“ Write workflows in plain English instead of using flowcharts
bearify.aiยท7hยท
Discuss: Hacker News
๐Ÿค–Archive Automation
Inlining in the Glasgow Haskell Compiler:Empirical Investigation and Improvement
era.ed.ac.ukยท37mยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
How I found my way to contribute to OSS
tarasyarema.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Identity Crisis in the Aftermath of Human-Decentering
doppioperfavore.substack.comยท11hยท
Discuss: Substack
๐Ÿ›Digital humanities
Why Most AI Agents Fail in Production (And How to Build Ones That Donโ€™t)
dev.toยท2hยท
Discuss: DEV
โšกIncremental Computation
CrushFTP: Older versions can grant unauthorized admin access
heise.deยท17h
๐Ÿ”“Hacking
Selling your digital soul to use Bluesky's DMs isn't just a bad idea, it's the law
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ Personal Archives
Bazel and action (non-) determinism
blogsystem5.substack.comยท1dยท
Discuss: Substack
๐Ÿ”„Reproducible Builds
Challenging Disability and Interaction Norms in XR: Cooling Down the Empathy Machine in Waiting for Hands
arxiv.orgยท18h
โœ‹Tactile Computing
MS warns 'active attacks' on its tech, experts 'assume you've been compromised'
pcgamer.comยท1dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Airside Labs
dev.toยท4hยท
Discuss: DEV
๐Ÿ•ต๏ธPenetration Testing
Building Bod.Coach: LLM Lessons Learned The Hard Way.
dev.toยท3hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Tell HN: GPT a and B Chatted 32 Rounds via Our Mediation Layer โ€“ No Crashes
news.ycombinator.comยท10hยท
Discuss: Hacker News
๐Ÿ“ABNF Extensions
Arch Linux users told to purge Firefox forks after AUR malware scare
theregister.comยท5h
๐Ÿ”ŒOperating system internals
Launching ANCP โ€” Secure Login for AI Agents Without VPN or OAuth
dev.toยท2dยท
Discuss: DEV
๐Ÿ”’Language-based security
The Chainsaw Metaphor: AI in software development represents an evolution, not a destructive revolution
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Language Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap