Why Your Password Storage is Fine, But Your File Checksum is Obsolete
dev.to·3d·
Discuss: DEV
Archive Checksums
The Why of PGP Authentication
articles.59.ca·16h
🔑Cryptographic Protocols
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·2d
🛡Cybersecurity
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
Mastering Zod Validation Mastering Data Validation and Error Handling in TypeScript with Zod
blog.codeminer42.com·3d
Format Validation
Three ways formally verified code can go wrong in practice
buttondown.com·11h
📜Proof Carrying Code
Show HN: An open-source starter kit for implementing OWASP ASVS 5.0
github.com·9h·
Discuss: Hacker News
🔓Open Source Software
Sorting encrypted data without decryption: a practical trick
dev.to·13h·
Discuss: DEV
🔐Hash Functions
Unsure what to do as lab has grown
reddit.com·5h·
Discuss: r/homelab
🖥Home Lab Setup
Paper Highlights - Do Password Managers Improve Password Hygiene?
blog.passwordresearch.com·3h·
🔓Password Cracking
Phishing Protection: Tools SOC Teams Trust in 2025 – An Ultimate Guide
vmray.com·3d
🎯Threat Hunting
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ing·21h
🏺ZIP Archaeology
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
APRS over LoRa with RNode | unsigned.io
unsigned.io·18h
📻Homebrew Protocols
Announcing coreboot 25.09 release
blogs.coreboot.org·5h
🔌Operating system internals
Building a Trusted Internet Starts with Hosting Providers
circleid.com·2d
🏠Homelab Federation
SSH Security: Why You Should Touch to Verify
ubicloud.com·21h·
Discuss: Hacker News
🔒Hardware Attestation
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing