Following cyberattack, Japan is days away from running out of country's favorite beer
techspot.comยท1h
๐Ÿ›กCybersecurity
End of the Line for Windows 10?
privacyinternational.orgยท2d
๐Ÿ”ŒOperating system internals
Social Media Provenance Challenge
tbray.orgยท2d
๐Ÿ”PKI Archaeology
BBKB Community
bbkb-community.github.ioยท2dยท
Discuss: Hacker News
โŒจ๏ธMechanical Keyboards
Talent Is Alignment
xlii.spaceยท1dยท
Discuss: Hacker News
๐ŸŽตAcoustic Fingerprinting
Incremental Design, DevOps, Microservices & CICD โ€ข Michael Nygard & Dave Farley
youtube.comยท1d
๐Ÿ”„Reproducible Builds
Show HN: Fast API for Data Cleaning
getflookup.comยท19hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Show HN: API for removing watermarks from Sora 2 videos
cliploom.appยท21hยท
Discuss: Hacker News
๐ŸŽฌWebCodecs
The Billion-Token Tender: Why RAG Isn't Fading, It's Gearing Up
tenderstrike.comยท1dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
Digital ID โ€“ The New Chains of Capitalist Surveillance
theslowburningfuse.wordpress.comยท1dยท
Discuss: Hacker News
๐Ÿ”Soviet Cryptography
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.eduยท3d
๐Ÿ”“Password Cracking
Trusted enclaves from Intel and AMD shown vulnerable to physical attacks
techspot.comยท1dยท
Discuss: r/technews
๐Ÿ›ก๏ธRISC-V Security
CometJacking attack tricks Comet browser into stealing emails
bleepingcomputer.comยท17hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage
darkreading.comยท18h
๐Ÿ•ต๏ธVector Smuggling
How Simple IDs Can Leak Your Secrets
dev.toยท17hยท
Discuss: DEV
๐Ÿ”คEBCDIC Privacy
This dangerous new Android malware disguises itself as a VPN or IPTV app - so be on your guard
techradar.comยท1d
๐Ÿ”“Hacking
Predictive Preference Learning from Human Interventions
arxiv.orgยท1d
๐ŸŽ›๏ธFeed Filtering
Diagnosing Shortcut-Induced Rigidity in Continual Learning: The Einstellung Rigidity Index (ERI)
arxiv.orgยท2d
โœจEffect Handlers
Unpacking Musical Symbolism in Online Communities: Content-Based and Network-Centric Approaches
arxiv.orgยท2d
๐Ÿ’ฟBinary Musicology