This Unbreakable CIA Cipher Fooled the World for 37 Years. Then Two People Accidentally Solved It.
popularmechanics.com·1d
🔐Cryptographic Archaeology
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.com·3d
🔓Hacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·3d
🦠Parasitic Storage
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·4d
🦠Malware Analysis
Flag this post
Hou Tu Pranownse Inglish
🗣️CMU Pronouncing
Flag this post
I Let AI Vote for Me in the Nix SC Election
❄️Nix Flakes
Flag this post
build system tradeoffs
⚙️Build Archaeology
Flag this post
THE LEAN MEAN MEME MACHINE
⚖️Feed Ranking
Flag this post
Digest #186: Inside the AWS Outage, Docker Compose in Production, F1 Hacks and 86,000 npm Packages Attacks
devopsbulletin.com·1d
❄️Nix Adoption
Flag this post
Linux/WASM
🕸️WASM Archives
Flag this post
Engineering a Rust optimization quiz
fasterthanli.me·1d
🦀Rust Macros
Flag this post
How do you stay safe from malware?
🏠Homelab Preservation
Flag this post
DDD and the Simplicity Gospel
📏Code Metrics
Flag this post
You Don't Need Anubis
🎫Kerberos Attacks
Flag this post
Building Resilient Go Services: Context, Graceful Shutdown, and Retry/Timeout Patterns
🌊Streaming Systems
Flag this post
Building an Intelligent RAG System with Query Routing, Validation and Self-Correction
🔍Information Retrieval
Flag this post
Bangladesh’s Internet transformation: From satellite shadows to digital highways
blog.apnic.net·2h
📡BGP Archaeology
Flag this post
Loading...Loading more...