The Why of PGP Authentication
articles.59.ca·2d
🔑Cryptographic Protocols
What is Mobile Threat Defense (MTD)?
jamf.com·3d
🎯Threat Hunting
Linux SBCs for development + RE
zetier.com·2d
🎯Emulator Accuracy
A disenshittification moment from the land of mass storage
doctorow.medium.com·2d
🧲Magnetic Philosophy
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.com·2d
🔓Hacking
Fighting Email Spam on Your Mail Server with LLMs — Privately
cybercarnet.eu·1d·
gRPC
Performant 2D Renderer: A Tour of Cute Framework's Renderer
randygaul.github.io·19h·
Discuss: Hacker News
🎯Emulator Accuracy
Three gripes about Go modules
jotaen.net·1d·
Discuss: Hacker News
🔓Reverse engineering
Using LibreChat to run your own chatbot connected to your MCP's
napsty.com·11h·
Discuss: Hacker News
gRPC
Three ways formally verified code can go wrong in practice
buttondown.com·1d·
📜Proof Carrying Code
Generalized Orders of Magnitude (GOOMs)
github.com·23h·
Discuss: Hacker News
🕸️Tensor Networks
Apparently I don’t get how to make kubernetes work
reddit.com·5d·
Discuss: r/kubernetes
🏠Homelab Federation
Proposal: Deconfig – Distributed Git Infrastructure with Durable Objects
github.com·2d·
Discuss: Hacker News
📦Git LFS
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·6d·
Discuss: Hacker News
🛡️WASM Security
Automated Fault Prediction and Residual Lifetime Estimation in Cryogenic Pumps via Dynamic Bayesian Network (DBN)
dev.to·1d·
Discuss: DEV
📊Quantization
Padding
reddit.com·1d·
Discuss: r/golang
🔧KAITAI
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·5d
🎫Kerberos Attacks
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
⚙️Proof Engineering
Show HN: Plural – Bringing AI to DevOps the way Cursor did for coding
news.ycombinator.com·3d·
Discuss: Hacker News
🌊Streaming Systems