Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.toยท1hยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Balance between refactoring and inheritance in your code
github.comยท14hยท
Discuss: Hacker News
โœ…Format Verification
What is Algebraic about Algebraic Effects?
interjectedfuture.comยท10h
โœจAlgebraic Effects
Linkage
11011110.github.ioยท10h
๐Ÿ“Linear Algebra
MCPโ€™s biggest security loophole is identity fragmentation
techradar.comยท18h
๐Ÿ”“Hacking
Digital Forensics Jobs Round-Up, September 15 2025
forensicfocus.comยท11h
๐ŸšจIncident Response
Rowhammer: TRR on DDR5 DRAM has been broken
comsec.ethz.chยท10hยท
๐Ÿ”RISC-V Forensics
The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity
english.elpais.comยท2d
๐Ÿ—๏ธPaleocryptography
A Slotted Hash Cons for Alpha Invariance
philipzucker.comยท8hยท
Discuss: Hacker News
ฮปLambda Encodings
Cybersecurity in The Arab World: Technological and Socio-Political Dimensions
cacm.acm.orgยท6h
๐Ÿ›กCybersecurity
I amazed AI by demonstrating time travel
aardvark.co.nzยท7h
โฐTime Crystals
The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.comยท4h
โšกProof Automation
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.comยท18h
๐Ÿ”—Topological Sorting
GuitarPie: Electric Guitar Fretboard Pie Menus
andreasfender.comยท11hยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Physics
You can't test if quantum uses complex numbers
algassert.comยท14hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Sprites mods - Hard disk hacking - Intro
web.archive.orgยท13h
๐ŸŽฎCartridge Archaeology
Data Poisoning Attacks
infosecwriteups.comยท2d
๐Ÿ”Vector Forensics
Google releases VaultGemma, its first privacy-preserving LLM
arstechnica.comยท5h
๐Ÿ’ปLocal LLMs
Did you solve it? The simple T-puzzle that fools everyone (at first!)
theguardian.comยท10h
๐Ÿ–‹Typography