End of the Line for Windows 10?
privacyinternational.org·2d
🔌Operating system internals
Social Media Provenance Challenge
tbray.org·2d
🔐PKI Archaeology
BBKB Community
bbkb-community.github.io·2d·
Discuss: Hacker News
⌨️Mechanical Keyboards
Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
theregister.com·1d
🔓Hacking
ThinkSound AI
thinksoundai.com·1d·
Discuss: Hacker News
🎧Learned Audio
AI-Powered Shelf Price Verification: Matching Label Prices to POS Server Prices
blog.roboflow.com·1d·
Discuss: Hacker News
Proof Automation
The quest for every Gap store playlist ever
theverge.com·17h
📼Cassette Culture
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.edu·3d
🔓Password Cracking
New kubernetes-sigs/headlamp UI 0.36.0 release
github.com·1d
🌀Brotli Internals
CometJacking attack tricks Comet browser into stealing emails
bleepingcomputer.com·12h·
Discuss: Hacker News
🕵️Vector Smuggling
How Simple IDs Can Leak Your Secrets
dev.to·12h·
Discuss: DEV
🔤EBCDIC Privacy
This dangerous new Android malware disguises itself as a VPN or IPTV app - so be on your guard
techradar.com·1d
🔓Hacking
Predictive Preference Learning from Human Interventions
arxiv.org·1d
🎛️Feed Filtering
Diagnosing Shortcut-Induced Rigidity in Continual Learning: The Einstellung Rigidity Index (ERI)
arxiv.org·2d
Effect Handlers
Unpacking Musical Symbolism in Online Communities: Content-Based and Network-Centric Approaches
arxiv.org·2d
💿Binary Musicology
Moxie Marlinspike: The Cypherpunk Pirate Who Built Signal
hackernoon.com·3d
🕵️Vector Smuggling
sentdex: Unitree G1 Security Disaster
dev.to·1d·
Discuss: DEV
🔓Hacking
Redundancy-as-Masking: Formalizing the Artificial Age Score (AAS) to Model Memory Aging in Generative AI
arxiv.org·1d
🔲Cellular Automata
Dangerous DNS malware infects over 30,000 websites - so be on your guard
techradar.com·21h
🛣️BGP Hijacking