Bob the Angry Flower - Slogor
angryflower.comยท8h
๐Terminal Typography
Flag this post
Free Bespoke Sewing Patterns
๐Bookbinding
Flag this post
Most mobile game developers want Apple and Google to allow alternative app stores, survey finds
techspot.comยท6h
๐ธ๏ธWASM Archives
Flag this post
Slashdot Is Down [503]
๐งฒRISC-V Archaeology
Flag this post
Introducing: Local Browser AI
๐๏ธWhisper
Flag this post
Completing a new BASIC interpreter in 2025 (strings, math funcs, cassette)
๐บVT100 Emulation
Flag this post
Japan asks OpenAI not to infringe on 'irreplaceable' manga and anime content
engadget.comยท8h
๐น๏ธRetro Gaming
Flag this post
The Difference Between the Dark Web and the Deep Web
lifehacker.comยท2d
๐Hacking
Flag this post
Transforming enterprise operations: Four high-impact use cases with Amazon Nova
aws.amazon.comยท2h
๐Streaming Systems
Flag this post
Arylic launches Up2Stream.net website for DIY audio enthusiasts (Sponsored)
cnx-software.comยท2d
๐ตAudio Streaming
Flag this post
Jordan's Discord fans flock to VPNs to defeat sudden outage
techradar.comยท6h
๐ง
Tor Networks
Flag this post
The โPixnappingโ Attack Can Steal Your 2FA Codes
lifehacker.comยท1d
๐Password Cracking
Flag this post
A Bug Hunterโs Guide to CSP Bypasses (Part 1)
infosecwriteups.comยท1d
๐ก๏ธCLI Security
Flag this post
LLMAtKGE: Large Language Models as Explainable Attackers against Knowledge Graph Embeddings
arxiv.orgยท1d
๐งฎKolmogorov Complexity
Flag this post
Secret-Protected Evolution for Differentially Private Synthetic Text Generation
arxiv.orgยท1d
๐คSecure Multiparty
Flag this post
Go Network Programming: A Practical Guide to Network Models and Protocols
๐กNetwork Protocol Design
Flag this post
Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution
securelist.comยท7h
๐ฆ Malware Analysis
Flag this post
Loading...Loading more...