The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.aiΒ·1dΒ·
πŸ”PKI Archaeology
Learning to Route: A Rule-Driven Agent Framework for Hybrid-Source Retrieval-Augmented Generation
arxiv.orgΒ·22h
πŸ”Information Retrieval
They're in…now what? How to stop lateral movement when the phish bites
runzero.comΒ·10h
🎫Kerberos Attacks
Fitting It All in Your Head
systemsapproach.orgΒ·19h
πŸ“‘BGP Archaeology
19.5 years in Digital Preservation
aranewprofessionals.wordpress.comΒ·9h
πŸ’ΎData Preservation
A Global Mining Dataset
tech.marksblogg.comΒ·15hΒ·
Discuss: Hacker News
πŸ“¦METS Containers
# 8 Apothem ...History and Etymology of Math Terms
pballew.blogspot.comΒ·20hΒ·
πŸ“šArchive Mathematics
Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap
circleid.comΒ·3d
🌐DNS Security
Understanding Linux Namespaces: A Guide to Process Isolation
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”©Systems Programming
How we trained an ML model to detect DLL hijacking
securelist.comΒ·18h
πŸ”—Binary Similarity
The Curious About Everything Newsletter #55
jodiettenberg.substack.comΒ·12hΒ·
Discuss: Substack
🧲Magnetic Philosophy
Analysing the state of Happy Eyeballs implementations
blog.apnic.netΒ·2h
πŸ”ŒInterface Evolution
Nix pills
nixos.orgΒ·1d
❄️Nixpkgs
6th October – Threat Intelligence Report
research.checkpoint.comΒ·16h
πŸ›‘Cybersecurity
MOSIP, A National Digital Identity Software Solution
ciamweekly.substack.comΒ·12hΒ·
Discuss: Substack
πŸ”PKI Archaeology
Automate and Manage Dnsmasq
migus.orgΒ·9hΒ·
Discuss: Hacker News
πŸ€–Network Automation
URL Design (2010)
warpspire.comΒ·1dΒ·
Discuss: Hacker News
🌐Web Standards
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.comΒ·12h
πŸ•³οΈInformation Leakage
Verizon's I'm A Teapot Error And Other Technology Fails
thecodist.comΒ·7h
πŸ”“Hacking