Testing the 1130 MRAM core memory replacement on the IBM 1130 system - part 4
rescue1130.blogspot.comยท15hยท
โšกCircuit Archaeology
End of the Line for Windows 10?
privacyinternational.orgยท2d
๐Ÿ”ŒOperating system internals
Social Media Provenance Challenge
tbray.orgยท2d
๐Ÿ”PKI Archaeology
BBKB Community
bbkb-community.github.ioยท2dยท
Discuss: Hacker News
โŒจ๏ธMechanical Keyboards
Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
theregister.comยท2d
๐Ÿ”“Hacking
Show HN: Fast API for Data Cleaning
getflookup.comยท17hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Show HN: API for removing watermarks from Sora 2 videos
cliploom.appยท19hยท
Discuss: Hacker News
๐ŸŽฌWebCodecs
The Billion-Token Tender: Why RAG Isn't Fading, It's Gearing Up
tenderstrike.comยท1dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.eduยท3d
๐Ÿ”“Password Cracking
New kubernetes-sigs/headlamp UI 0.36.0 release
github.comยท1d
๐ŸŒ€Brotli Internals
CometJacking attack tricks Comet browser into stealing emails
bleepingcomputer.comยท15hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
This dangerous new Android malware disguises itself as a VPN or IPTV app - so be on your guard
techradar.comยท1d
๐Ÿ”“Hacking
Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage
darkreading.comยท16h
๐Ÿ•ต๏ธVector Smuggling
How Simple IDs Can Leak Your Secrets
dev.toยท15hยท
Discuss: DEV
๐Ÿ”คEBCDIC Privacy
Predictive Preference Learning from Human Interventions
arxiv.orgยท1d
๐ŸŽ›๏ธFeed Filtering
Diagnosing Shortcut-Induced Rigidity in Continual Learning: The Einstellung Rigidity Index (ERI)
arxiv.orgยท2d
โœจEffect Handlers
Moxie Marlinspike: The Cypherpunk Pirate Who Built Signal
hackernoon.comยท3d
๐Ÿ•ต๏ธVector Smuggling
sentdex: Unitree G1 Security Disaster
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
Unpacking Musical Symbolism in Online Communities: Content-Based and Network-Centric Approaches
arxiv.orgยท2d
๐Ÿ’ฟBinary Musicology