BlackRock Seeks to Tokenize ETFs After Bitcoin Fund Breakthrough
bloomberg.comยท13h
๐Ÿ”BitFunnel
September Patch Tuesday handles 81 CVEs
news.sophos.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
Big clouds scramble as EU Data Act brings new data transfer rules
theregister.comยท1dยท
๐Ÿ Homelab Federation
Building screenless digital jukebox for my daughter
rdeaton.spaceยท1dยท
Discuss: Hacker News
๐Ÿ—‚๏ธOptical Jukebox
Kerberoasting
blog.cryptographyengineering.comยท1dยท
๐ŸŽซKerberos Exploitation
GPUs as Collateral โ€“ Chip Based Asset-Backed Securities
medium.comยท11hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธModern Terminals
Taming Chaos with Antifragile GenAI Architecture
oreilly.comยท21h
๐Ÿ”ฒCellular Automata
A GitHub Co-Founder's Next Commit
opensourcepledge.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Google Pixel 10 adds C2PA to camera and Photos to spot AI-generated or edited images
securityaffairs.comยท1d
๐Ÿ•ธ๏ธWebP Analysis
Using Linters to Direct Agents
factory.aiยท2dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
I built SharedVolume โ€“ a Kubernetes operator to sync Git/S3/HTTP/SSH volumes across pods
reddit.comยท19hยท
Discuss: r/kubernetes
๐Ÿ”„Sync Engine
Rockwell Automation, Inc. (ROK) Presents At Morgan Stanley's 13th Annual Laguna Conference (Transcript)
seekingalpha.comยท14h
โš™๏ธModern Assembly
Why Public Key Infrastructure Isnโ€™t the Silver Bullet for Digital Security
hackernoon.comยท3d
๐Ÿ”PKI Archaeology
VisionVoice: Making Signs Speak for the Visually Impaired with Google AI Studio
dev.toยท19hยท
Discuss: DEV
๐Ÿค–Advanced OCR
[Guest post] Digital replicas of the dead: a growing trend, a missing legal framework
ipkitten.blogspot.comยท2dยท
โš–๏ธEmulation Ethics
Sanity check: New hardware for DIY NAS
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ HomeLab
Automated Biotope Design Optimization via Generative Adversarial Networks (GANs)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
The Protocol Genome A Self Supervised Learning Framework from DICOM Headers
arxiv.orgยท2d
๐Ÿง Machine Learning
**Essential Python Security Practices: Building Robust, Attack-Resistant Applications**
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security