IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.orgยท24mยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Check if Your Password Has Been Compromised
cubiclenate.comยท1d
๐Ÿ”“Password Cracking
What is JWT? How do Secret, Public, Private Keys actually work?
dev.toยท12hยท
Discuss: DEV
๐Ÿ”‘Cryptographic Protocols
UTF-8 Is Beautiful
hackaday.comยท6h
๐Ÿ”ฃUnicode
OTW - Bandit Level 4 to Level 5
tbhaxor.comยท5h
๐Ÿ”งKAITAI
A Kevin week
blog.mitrichev.chยท14hยท
๐Ÿ“Linear Algebra
Otto Kekรคlรคinen: Zero-configuration TLS and password management best practices in MariaDB 11.8
optimizedbyotto.comยท1dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Cognitive and Gestalt psychology in your code: SMVP pattern
github.comยท11hยท
Discuss: Hacker News
โœ…Format Verification
Supabase Security Best Practices: Common Misconfigurations We Keep Seeing
pentestly.ioยท11hยท
Discuss: r/programming
โœ…Archive Fixity
Streaming BLE Sensor Data into Microsoft Power BI
hackster.ioยท1h
๐Ÿ“ŠHomelab Monitoring
A simple way to automate RHEL VM creation
marcin.juszkiewicz.com.plยท1d
๐Ÿ”ŒOperating system internals
Secure QKD Network Resilience via Dynamic Threshold-Adaptive Key Reconciliation
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Quantum Cryptography
ELA-1516-1 imagemagick security update
freexian.comยท17h
๐Ÿ’ฃZIP Vulnerabilities
Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers
securelist.comยท1h
๐Ÿ”“Hacking
Building a Simple Stack-Based Virtual Machine in Go
blog.phakorn.comยท4hยท
๐Ÿ”งRISC-V Assembler
How to Open and Mount BitLocker Partitions on Linux with Dislocker or Cryptsetup
std.rocksยท1hยท
Discuss: Hacker News
๐Ÿ’พDisk Utilities
Tooling for Maintaining YAML Files
stuartellis.nameยท19h
โœ…Archive Validation
Beyond Traditional Pseudorandomness, Tsotchkes' Quantum Random Number Generation
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”Quantum Cryptography
ISO C++ committee has a new chief sheep herder
shape-of-code.comยท12h
๐Ÿ“œProof Carrying Code