The Day I Hacked XCTrack
blog.syrac.orgยท11hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.toยท5hยท
Discuss: DEV
๐Ÿ”คCharacter Classification
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
Creating Real-Time Multimodal AI Pipelines: Scaling File Processing to 50M Daily Uploads
engineering.salesforce.comยท2h
๐ŸŒŠStream Processing
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท11h
๐Ÿ”Vector Forensics
UNREDACTED Magazine Issue 009
inteltechniques.comยท3h
๐Ÿ“กRSS Readers
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.orgยท9hยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Typography
Computer vision AI VTIโ€™s against Phishing
vmray.comยท2d
๐Ÿ‘๏ธPerceptual Hashing
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท15h
๐ŸšจIncident Response
Extract speaker notes from PowerPoint to text
dri.esยท1d
๐Ÿ“œPalimpsest Analysis
simonw/claude-skills
simonwillison.netยท2h
๐Ÿ“„PostScript
My old Infocom transcripts
blog.zarfhome.comยท1d
๐Ÿ•น๏ธRetro Gaming
DupeGuru lets you quickly find and remove duplicate files from your drives
techspot.comยท1d
๐Ÿ”„Content Deduplication
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท13h
๐Ÿ›๏ธPREMIS Metadata
The Death of the Curious Developer
hackernoon.comยท20h
๐ŸงญContent Discovery
An enough week
blog.mitrichev.chยท1dยท
๐Ÿ“ˆLinear programming
Parallels Desktop 26.1.1
tidbits.comยท3h
๐Ÿ” Terminal Fonts
Sorting encrypted data without decryption: a practical trick
dev.toยท11hยท
Discuss: DEV
๐Ÿ”Hash Functions
Criminal Management Division Quarterly Goals
medium.comยท15h
๐Ÿ“ผCassette Hacking