Episode 435: Platform SSO (Oktaโ€™s Version)
podcast.macadmins.orgยท5h
๐Ÿ”’Hardware Attestation
Flag this post
Custom ROM versus extensive package removal, for de-Googling a Samsung cellphone
kevinboone.meยท1d
๐ŸŽฎCartridge Archaeology
Flag this post
Why Your Passcode Should Repeat A Digit
mindyourdecisions.comยท11h
๐Ÿ”“Password Cracking
Flag this post
Apple releases iOS 26.1, macOS 26.1, other updates with Liquid Glass controls and more
arstechnica.comยท5h
๐ŸŽApple Archive
Flag this post
OpenAI pilots Aardvark for automated security reviews in code
the-decoder.comยท2d
๐Ÿš€Indie Hacking
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท4d
๐ŸŒBGP Security
Flag this post
Italy to launch age verification system for porn sites
wantedinrome.comยท2dยท
๐ŸŒWARC Forensics
Flag this post
Show HN: AI tool to scan internal docs for GDPR violations before audits
news.ycombinator.comยท4dยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Flag this post
Apple's App Store Full Front End Source Code
github.comยท9hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWebAssembly
Flag this post
How to deploy MCP Servers on AWS with the Best Practices
dev.toยท4hยท
Discuss: DEV
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Flag this post
SLES 16: SUSE's Flagship Linux with AI and Post-Quantum Crypto
heise.deยท17h
๐Ÿ”HSM Integration
Flag this post
MCP Security: Navigating the Exploit Playbook for Agent
dev.toยท3dยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Flag this post
Logic-informed reinforcement learning for cross-domain optimization of large-scale cyber-physical systems
arxiv.orgยท2h
๐ŸŽฏPerformance Proofs
Flag this post
The Great Tenant Mix-Up: How I Accidentally Became Every Companyโ€™s Employee
infosecwriteups.comยท22h
๐Ÿ”“Hacking
Flag this post
Relation-Aware Bayesian Optimization of DBMS Configurations Guided by Affinity Scores
arxiv.orgยท1d
๐Ÿš€Query Optimization
Flag this post
H-FA: A Hybrid Floating-Point and Logarithmic Approach to Hardware Accelerated FlashAttention
arxiv.orgยท2h
โšกCompression Hardware
Flag this post
I Benchmarked 3 Go Concurrency Patterns. The "Fastest" One Would Destroy Production
dev.toยท1hยท
Discuss: DEV
๐ŸŒŠStream Processing
Flag this post
Data Security Posture Management โ€” What Does 'Best in Class' Look Like?
darkreading.comยท5d
๐ŸŽฏThreat Hunting
Flag this post