A small software change that delights: holding down a key on my iPad keyboard now brings up a menu of accented variations of that letter. This is a massive impr...
andrewdoran.uk·21h
🖋Typography
Flag this post
European Commission Proposes Sweeping Changes to A.I. And Privacy Policies
pxlnv.com·1d
🔤EBCDIC Privacy
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Ten Blue Links, “Pop goes the bubble” edition
ianbetteridge.com·17h
🚀Indie Hacking
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.com·2d
🔤EBCDIC Privacy
Flag this post
[D] ICLR double blind reviewing
🎓Academic Torrents
Flag this post
No Key, Mo Problems
🔗Hash Chains
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.org·2d
🤖Advanced OCR
Flag this post
A decades-old threat command is making a comeback - so don't let the "finger" of doom affect you
techradar.com·3d
📟Terminal Forensics
Flag this post
Necessary Conditions GPT Must Satisfy for Producing Complex Code
🗣️Domain-Specific Languages
Flag this post
[Showcase] WulfVault – self-hosted secure file sharing with audit logs, large file support and custom branding
🗄️File Systems
Flag this post
Post-Quantum Cryptography in .NET
🔐Quantum Security
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
the-independent.com·1d
🦠Parasitic Archives
Flag this post
How One Tiny IDOR Created a Digital Domino Effect That Toppled Their Entire Security
infosecwriteups.com·6h
🚀Indie Hacking
Flag this post
Loading...Loading more...