ALLOW ALL? Brussels deregulation drive to make rejecting cookies harder
euobserver.com·59m
⚖️Legal Compliance
Protecting your (my) passport from liquid damage
blog.jgc.org·1d·
💣Compression Security
What Is Identity Threat Detection and Response?
heimdalsecurity.com·5h
🎯Threat Hunting
[$] Managing encrypted filesystems with dirlock
lwn.net·3d
🔐Archive Encryption
Making, not Taking, the Best of N
arxiv.org·1d
🔍Archive Semantics
Breaking decompilers with single-function, and no-main() C codebases
joshua.hu·14h·
Discuss: Hacker News
🧠Lisp Dialects
Keeping Scammers Away from Your System
dev.to·1d·
Discuss: DEV
🔓Hacking
A guide to creating accessible PDFs using free tools
piccalil.li·1d·
Discuss: Hacker News
📄PostScript
AI-Powered Shelf Price Verification: Matching Label Prices to POS Server Prices
blog.roboflow.com·1d·
Discuss: Hacker News
Proof Automation
Nine HTTP Edge Cases Every API Developer Should Understand
blog.dochia.dev·23h·
Format Verification
Adaptive Diffusive Quantization for Enhanced Image Reconstruction Fidelity
dev.to·1d·
Discuss: DEV
🖼️JPEG XL
"The G in GPU is for Graphics damnit "
ut21.github.io·1d·
Discuss: Hacker News
🔲Cellular Automata
Best open source auth tools
cerbos.dev·16h·
Discuss: r/programming
🔐Capability Systems
Ghosts of Unix Past: a historical search for design patterns (2010)
lwn.net·7h·
🏠Homelab Archaeology
ActiNet: Activity intensity classification of wrist-worn accelerometers using self-supervised deep learning
arxiv.org·7h
🧠Machine Learning
How do you get your dev team to shift left by themselves for real?
dev.to·4h·
Discuss: DEV
⚔️Lean Tactics
Purrception: Variational Flow Matching for Vector-Quantized Image Generation
arxiv.org·7h
🌀Fractal Compression
CLUE: Non-parametric Verification from Experience via Hidden-State Clustering
arxiv.org·7h
🧠Machine Learning
PUL-Inter-slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks
arxiv.org·7h
🎯Threat Hunting
Module 3 — Derived Digital Identities and Interoperability
dev.to·2d·
Discuss: DEV
🔐PKI Archaeology