Signal’s Post-Quantum Cryptographic Implementation
schneier.com·17h
🔐Quantum Security
Flag this post
5 ways to prevent password reset attacks
fingerprint.com·4h
🎯NTLM Attacks
Flag this post
writerdeckOS
writerdeckos.com·4h
🔌Operating system internals
Flag this post
Show HN: On-chain file authenticity via Solana NFT
deepfakesafety.com·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
MacBook Pro M5 Teardown: Still only moderately repairable
heise.de·17h
🍎Apple Archive
Flag this post
What we’re loving in October: seaweed sweaters, nano chargers and perfect pantry jars
theguardian.com·9h
Coffee
Flag this post
Project: VBUS Fixer (When 5.5V is Just Too Much for Your USB Devices)
goughlui.com·21h
⚙️DIY Electronics
Flag this post
What to do when you have a crash in the runtime control flow guard check
devblogs.microsoft.com·14h
🧪RISC-V Fuzzing
Flag this post
Building a Multi-Toolchain Rain-Triggered Greenhouse
hackster.io·1d
⚙️RISC-V Microcode
Flag this post
How to Buying Old Gmail Accounts: A fully Guide to Best ...
dev.to·1d·
Discuss: DEV
🏺ZIP Archaeology
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.edu·23h
📟Terminal Forensics
Flag this post
FreeBSD eliminates root privileges and achieves reproducible builds
discoverbsd.com·1d
🔌Operating system internals
Flag this post
How to Set Up a Highly Available ZFS Pool Using Mirroring and iSCSI
klarasystems.com·11h
💿ZFS Internals
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·11h·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.com·12h
🎯Threat Hunting
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.io·2d·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
AMD Updates Zen 3 / Zen 4 CPU Microcode For Systems Lacking Microcode Signing Fix
phoronix.com·18h
CPU Microarchitecture
Flag this post
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.com·14h
🦠Malware Analysis
Flag this post