The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.aiΒ·1dΒ·
πŸ”PKI Archaeology
Learning to Route: A Rule-Driven Agent Framework for Hybrid-Source Retrieval-Augmented Generation
arxiv.orgΒ·20h
πŸ”Information Retrieval
They're in…now what? How to stop lateral movement when the phish bites
runzero.comΒ·8h
🎫Kerberos Attacks
Fitting It All in Your Head
systemsapproach.orgΒ·17h
πŸ“‘BGP Archaeology
19.5 years in Digital Preservation
aranewprofessionals.wordpress.comΒ·7h
πŸ’ΎData Preservation
A Global Mining Dataset
tech.marksblogg.comΒ·13hΒ·
Discuss: Hacker News
πŸ“¦METS Containers
# 8 Apothem ...History and Etymology of Math Terms
pballew.blogspot.comΒ·18hΒ·
πŸ“šArchive Mathematics
Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap
circleid.comΒ·3d
🌐DNS Security
Understanding Linux Namespaces: A Guide to Process Isolation
dev.toΒ·7hΒ·
Discuss: DEV
πŸ”©Systems Programming
How we trained an ML model to detect DLL hijacking
securelist.comΒ·16h
πŸ”—Binary Similarity
The Curious About Everything Newsletter #55
jodiettenberg.substack.comΒ·10hΒ·
Discuss: Substack
🧲Magnetic Philosophy
Nix pills
nixos.orgΒ·1d
❄️Nixpkgs
6th October – Threat Intelligence Report
research.checkpoint.comΒ·14h
πŸ›‘Cybersecurity
MOSIP, A National Digital Identity Software Solution
ciamweekly.substack.comΒ·10hΒ·
Discuss: Substack
πŸ”PKI Archaeology
Automate and Manage Dnsmasq
migus.orgΒ·7hΒ·
Discuss: Hacker News
πŸ€–Network Automation
URL Design (2010)
warpspire.comΒ·1dΒ·
Discuss: Hacker News
🌐Web Standards
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.comΒ·10h
πŸ•³οΈInformation Leakage
Verizon's I'm A Teapot Error And Other Technology Fails
thecodist.comΒ·5h
πŸ”“Hacking
Valuable News – 2025/10/06
vermaden.wordpress.comΒ·21h
πŸ”ŒOperating system internals