Unboxing Newton Press – Apple’s Text Authoring Software for the Newton (research.reisen)
research.reisen·1d
🖥️Vintage Macintosh
Three ways formally verified code can go wrong in practice
buttondown.com·9h
📜Proof Carrying Code
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
Investigating targeted “payroll pirate” attacks affecting US universities
microsoft.com·1d
🎯NTLM Attacks
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
To MD - Convert PDFs, Word, HTML and more to Markdown
tomd.io·18h·
Discuss: Hacker News
🔄Migration Tools
OCR vs ADE: Mechanisms Behind the Methods
dev.to·1d·
Discuss: DEV
📄OCR
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Detecting and Mitigating Insertion Hallucination in Video-to-Audio Generation
arxiv.org·22h
👁️Perceptual Coding
Work in content? You should be using AI for alt text
tk.gg·1d·
Discuss: Hacker News
📄PostScript
Data Hoarder Uses AI to Create Searchable Database of Epstein Files
404media.co·1d
🌐WARC Forensics
Show HN: Rebuilt Bible search app to run 100% client-side with Transformers.js
biblos.app·4h·
Discuss: Hacker News
📜Binary Philology
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
Automated Spectral Fingerprint Deconvolution for Polymer Identification via Deep Oligomer Networks
dev.to·1h·
Discuss: DEV
🌈Spectroscopy
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·11h
🌐DNS Security
Windows Product Activation Creator Reveals Truth Behind XP's Most Notorious Product Key
tech.slashdot.org·1d
🏺Kerberos Archaeology
Remove Text from Video in Capcut
vidau.ai·1d·
Discuss: Hacker News
🎞️MKV Analysis
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to·2d·
Discuss: DEV
👁️Perceptual Hashing
Cache smuggling: When a picture isn't a thousand words
expel.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities