libusb/hidapi
github.com·20h
🔌Single Board PC
[$] Managing encrypted filesystems with dirlock
lwn.net·3d
🔐Archive Encryption
Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach
zenodo.org·2d·
Discuss: Hacker News
🏺Kerberos Archaeology
Gernot's List of Systems Benchmarking Crimes
gernot-heiser.org·1d·
🎯Performance Forensics
WiFi Can See You
coffee.link·12h·
Discuss: Hacker News
🏠Home Automation
SMS: Self-supervised Model Seeding for Verification of Machine Unlearning
arxiv.org·1d
🧠Machine Learning
Show HN: A USB controller makes one flash drive 4 independent disks (no drivers)
xusb.net·2d·
Discuss: Hacker News
🔌Operating system internals
CTFs as a Rosetta Stone
bhmt.dev·2d·
Discuss: Hacker News
🔓Hacking
The Anti-Truth Mandate: A Technical Flaw in Claude's Safety Architecture
github.com·1d·
Discuss: Hacker News
🎯Gradual Typing
On Sora
thelastwave.substack.com·1h·
Discuss: Substack
🏛Digital humanities
sentdex: Is My Unitree G1 Spying on Me?
dev.to·1d·
Discuss: DEV
🕵️Vector Smuggling
Best open source auth tools
cerbos.dev·2h
🔐Capability Systems
Your Smart Home Might Not Be As Secure As You Think
lifehacker.com·2d
🏠Home Automation
Nine HTTP Edge Cases Every API Developer Should Understand
blog.dochia.dev·9h·
Format Verification
Who Will AI Help More–Attackers or Defenders?
danielmiessler.com·5h·
Discuss: Hacker News
🎯Threat Hunting
Persona Injection: LLM context management experiment and model's self-analysis
news.ycombinator.com·3h·
Discuss: Hacker News
🤖Grammar Induction
A Puzzling Performance Puzzle
kodewerk.com·2d·
Discuss: Hacker News
🧪Binary Fuzzing
Did Apple ever patch this?
gbhackers.com·16m·
Discuss: Hacker News
🔓Hacking