Rhadamanthys 0.9.x โ€“ walk through the updates
research.checkpoint.comยท1d
๐ŸงฌBitstream Evolution
OpenSSL patches 3 vulnerabilities, urging immediate updates
securityaffairs.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
linux.slashdot.orgยท15h
๐Ÿ“ŸTerminal Forensics
Fuzzypass: Hacking Your Brain to Remember 100 Bits of Entropy
lockeidentity.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Microcomputers โ€“ The Second Wave: Toward A Mass Market
technicshistory.comยท6hยท
Discuss: Hacker News
๐ŸŽApple Computing
Reversing the Technical Interview (2017)
aphyr.comยท1dยท
Discuss: Hacker News
๐ŸŽฎSwitch Archaeology
Prime Video
corrode.devยท1dยท
Discuss: r/rust
๐Ÿ“กFeed Archaeology
Self-Forcing++: Towards Minute-Scale High-Quality Video Generation
arxiv.orgยท3h
โšกLZ4 Streaming
Automated Anomaly Detection in MFM Magnetic Domain Wall Dynamics via Hyperdimensional Fourier Analysis
dev.toยท1dยท
Discuss: DEV
๐ŸงฒMagnetic Recording
Algorithmic Black Swans: Can We Predict the Next Flash Crash? by Arvind Sundararajan
future.forem.comยท17hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Finding buried treasures with physics: 'Fingerprint matrix' method uncovers what lies beneath the sand
phys.orgยท17h
๐Ÿ’ฟOptical Forensics
OpenAI's GPT-OSS-20B Model and Safety Alignment Issues in a Low-Resource Language
arxiv.orgยท3h
๐ŸŒProtocol Synthesis
A Beginnerโ€™s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.comยท23h
๐ŸคConsensus Algorithms
RLP: Reinforcement as a Pretraining Objective
arxiv.orgยท3h
โš”๏ธLean Tactics
Say One Thing, Do Another? Diagnosing Reasoning-Execution Gaps in VLM-Powered Mobile-Use Agents
arxiv.orgยท3h
โš™๏ธTLA+
EvolveCaptions: Empowering DHH Users Through Real-Time Collaborative Captioning
arxiv.orgยท3h
๐ŸŽ™๏ธWhisper
'Klopatra' Trojan Makes Bank Transfers While You Sleep
darkreading.comยท2d
๐Ÿ”“Hacking
InvThink: Towards AI Safety via Inverse Reasoning
arxiv.orgยท3h
โš–๏ธHoare Logic