Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท1dยท
๐Ÿ“ŠHyperLogLog
Indexing, Hashing & Query Optimization in DBMS
dev.toยท4hยท
Discuss: DEV
๐Ÿš€Query Optimization
Public Key Infrastructure with Secure Shell
free-pmx.orgยท21hยท
Discuss: r/homelab
๐ŸŽฏNTLM Attacks
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.comยท7hยท
๐Ÿ—๏ธPaleocryptography
Security Affairs newsletter Round 544 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท10h
๐Ÿ›กCybersecurity
Red Stone One Carat โ€” TryHackMe Challenge Write-up
infosecwriteups.comยท1d
๐Ÿ›ก๏ธCLI Security
A content defined chunking algorithm testbed
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Content Deduplication
A grand week
blog.mitrichev.chยท8hยท
๐ŸงฎSMT Solvers
A Beginnerโ€™s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.comยท3d
๐ŸคConsensus Algorithms
std::ranges may not deliver the performance that you expect
lemire.meยท46m
๐Ÿ“Error Bounds
Plugin Secure
rya.ncยท1dยท
Discuss: Hacker News
โœ…Checksum Validation
Eliminating the Precisionโ€“Latency Trade-Off in Large-Scale RAG
thenewstack.ioยท2d
๐ŸŽฏRetrieval Systems
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.meยท2d
๐Ÿ”งBinary Parsers
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท3hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
News for September 2025
ptreview.sublinear.infoยท1d
๐ŸงชProperty-Based Testing
Reclaim Your Scammed Crypto with Expert Recovery Services META TECH RECOVERY PRO
dev.toยท3hยท
Discuss: DEV
๐Ÿ”—Hash Chains
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท6hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Whatever happened to SHA-256 support in Git?
lwn.netยท3dยท
๐Ÿ“ฆContent Addressing
Python PEP 636 โ€“ Structural Pattern Matching: Tutorial
peps.python.orgยท11hยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
Running your own HashDB lookup
cyber.wtfยท5d
โœ…Archive Checksums