SZI: Tiled Images from ZIP Archives
literarymachin.es·1d
🕸️WebP Analysis
Flag this post
Swift Sings: MDX-Net Vocal Splits and RVC Voice Conversion On-Device with ONNX/CoreML
web.navan.dev·1d
🎧Learned Audio
Flag this post
Checklist: Securely Using a Python Program
nocomplexity.com·22h
🛡️CLI Security
Flag this post
The art and science of effective security storytelling
redcanary.com·23h
🔗Data Provenance
Flag this post
Simple BBS in a Commodore Emulator
adamwhitney.net·12h
💾vintage computing
Flag this post
Splitting (Empty) Strings (2017)
🧠Lisp Dialects
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.org·8h
🔍Vector Forensics
Flag this post
Secure by Design in the Age of GenAI: How Devs Must Shift Their Software Security Practices in 2025
🔄Reproducible Builds
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·1d
🕳️Information Leakage
Flag this post
A new measure for dynamic leakage based on quantitative information flow
arxiv.org·1d
🕳️Information Leakage
Flag this post
Ralf Brown's Files (The x86 Interrupt List)
📺VT100
Flag this post
We shrunk an 800GB container image down to 2GB (a 99.7% reduction). Here's our post-mortem.
🏺ZIP Archaeology
Flag this post
An Analysis of iBoot's Image4 Parser
🔒Secure Boot
Flag this post
Exploring Vulnerability in AI Industry
arxiv.org·8h
🧠Intelligence Compression
Flag this post
How to Use Zorn's Lemma
⚔️Lean Theorem
Flag this post
Loading...Loading more...