Custom ROM versus extensive package removal, for de-Googling a Samsung cellphone
kevinboone.me·4d
🎮Cartridge Archaeology
Flag this post
The day IPv6 went away
ounapuu.ee·22h
📡BGP Archaeology
Flag this post
3 Signals You Can’t Ignore from the 2025 Hacker-Powered Security Report
hackerone.com·2d
🔓Hacking
Flag this post
How To Build A Smartwatch: Software - Setting Expectations & Roadmap
ericmigi.com·2d·
Discuss: Hacker News
🔄Sync Engine
Flag this post
What are good fanless alternatives to ASUS NUC 13 Rugged?
asus.com·4d·
Discuss: r/homelab
🖥️Modern Terminals
Flag this post
Introducing the Web Thing Protocol
tola.me.uk·10h·
Discuss: Hacker News
🌐Network Protocols
Flag this post
FBI subpoenas the web registrar behind Archive.is
theverge.com·8h
🗜️ZIP Forensics
Flag this post
Why Workflows Fail: The Indeterministic Business Problem
blog.dragonscale.ai·1d·
Discuss: Hacker News
🌊Stream Processing
Flag this post
Field notes from making a living without writing a line of code
ag404labs.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Flag this post
External-Secrets with Google Secret Manager set up. How do you do it?
reddit.com·1d·
Discuss: r/kubernetes
📦Container Security
Flag this post
Firewall Recommendations
reddit.com·2d·
Discuss: r/homelab
🛡️eBPF Programs
Flag this post
Pebblebee’s new trackers are brighter, louder, thinner, and more colorful
theverge.com·10h
📱QR Archaeology
Flag this post
vz: Create VMs and run Linux-based OSs in Go with Apple Virtualization framework
github.com·2d·
Discuss: Hacker News
🍎Apple Archive
Flag this post
11 Useful Specialty Tools You Didn't Even Know Existed
lifehacker.com·1d
⚙️DIY Electronics
Flag this post
Baseus’ solar-powered dash cam is down to its best price yet
theverge.com·1d
🗂️Optical Jukebox
Flag this post
How I Built gemini-imagen: A CLI for Google Gemini Image Generation
dev.to·3d·
Discuss: DEV
🤖Archive Automation
Flag this post
Okay so I forked someone's project and now it's completely different 😅
dev.to·7h·
Discuss: DEV
🔄Schema Evolution
Flag this post
AI App Spending Report: Where Are the Security Tools?
darkreading.com·2d
🚀Indie Hacking
Flag this post
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes
theregister.com·1d
🚀Indie Hacking
Flag this post
Solving the AI Black Box Problem with Prisma AIRS 2.0
paloaltonetworks.com·1d
Proof Automation
Flag this post