Unlocking Uniqueness: Mastering the Unique Character Algorithm in Go
dev.to·5h·
Discuss: DEV
🌳Trie Structures
Lowercase leaving you cold? Introducing Retrocide
theregister.com·4h
🔠Terminal Fonts
Language Support for Marginalia Search
marginalia.nu·21h
🔍BitFunnel
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·9h
🔐Cryptographic Archaeology
ScribeOCR – Web interface for recognizing text, OCR, & creating digitized docs
github.com·10h·
Discuss: Hacker News
📄Document Streaming
Introducing OpenZL: An Open Source Format-Aware Compression Framework
engineering.fb.com·5h·
Modern Compression
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·3h
🔗Constraint Handling
Why does Japanese have kanji for very large numbers? • Quick & Tasty
quickandtastycooking.org.uk·2d
🇯🇵Japanese Computing
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
Unicode CLDR 48 Beta available for specification review
blog.unicode.org·3d
🔤EBCDIC Unicode
The non-problem of unsigned integers in Java
bitmath.blogspot.com·1h·
Discuss: Hacker News
🧮Algebraic Datatypes
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.com·1d·
🗝️Paleocryptography
A Global Mining Dataset
tech.marksblogg.com·10h·
Discuss: Hacker News
📦METS Containers
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.com·1d
🕵️Steganographic Compression
The Church of Emacs
jxself.org·6h
🐧FOSS
Write in C – Let it Be
wiki.tcl-lang.org·3h·
Discuss: Hacker News
🔩Systems Programming
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.com·6h
🕳️Information Leakage
What could go wrong when MySQL strict SQL mode is off?
synacktiv.com·4d
🧪Binary Fuzzing
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.com·7h
🔓Hacking
FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·6h
🔐Certificate Analysis