Obnam 3 status: chunks, credentials, help?
blog.liw.fiยท3d
๐Archive Encryption
Flag this post
Herodotus Android malware mimics human typing to evade detection
securityaffairs.comยท9h
๐ฆ Malware Analysis
Flag this post
Show HN: MicroBuilder โ Describe your idea, get it built fast (no agency needed)
๐Reproducible Builds
Flag this post
Embedding Leak Auditor
๐ต๏ธVector Smuggling
Flag this post
Indexing Coffee with Notion
โCoffee Science
Flag this post
API Development for Web Apps and Data Products
kdnuggets.comยท1d
๐Hypermedia APIs
Flag this post
Signalโs Post-Quantum Cryptographic Implementation
schneier.comยท6h
๐Quantum Security
Flag this post
Agent Diary: Oct 29, 2025 - The Great Simplification: When 172 Lines Suddenly Became Unnecessary
๐ณIncremental Parsing
Flag this post
Building Effective Prompts and Workflows for Code Review with goose
โ๏ธBuild Archaeology
Flag this post
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
๐กCybersecurity
Flag this post
PICOs-RAG: PICO-supported Query Rewriting for Retrieval-Augmented Generation in Evidence-Based Medicine
arxiv.orgยท13h
๐Information Retrieval
Flag this post
Yet another way to use Tornado Cash in 2025, a tool implemented in Python&C++
๐Apache Kafka
Flag this post
How to Stop Your AI from Making Things Up: A Guide to Grounding LLM Responses in Data
๐ปLocal LLMs
Flag this post
Loading...Loading more...