Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.comยท2d
๐Ÿ”—Data Provenance
Hack to School: Top 10 Cyber Threats Facing the Education Sector in 2025
bitsight.comยท3d
๐Ÿ›กCybersecurity
NASA found signs of alien life on Mars
cnet.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Logic
Keeping Things Expressive When DataFrames Are Involved
simplethread.comยท2dยท
Discuss: Hacker News
๐ŸงฎAlgebraic Datatypes
Vendor by Default (2021)
macwright.comยท2hยท
Discuss: Hacker News
โ„๏ธNix Flakes
Googleโ€™s top AI scientist says this is what he thinks will be the next generationโ€™s most needed skill
the-independent.comยท17h
๐Ÿ’ปCS
Progressive Delivery Prevents Digital Extinction
itrevolution.comยท2dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Public assassinations, suicide and abuse โ€“ and we call this social?
the-independent.comยท23h
๐Ÿ“กRSS
UK and US agree deal to speed up building of nuclear plants
the-independent.comยท11h
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night
securityboulevard.comยท4dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Researchers have shown that ChatGPT can be fooled by flattery and psychological pressure
madcornishprojectionist.co.ukยท28m
๐Ÿ”ฒCellular Automata
Liquid Glass Could Be One of Apple's Most Divisive System Designs Yet
wired.comยท30m
๐Ÿ–ฅ๏ธVintage Macintosh
โ€œOur Elsewhere,โ€ by Maxine Scates
newyorker.comยท30m
๐Ÿ“ผCassette Culture
996: The truth about working hours, then and now
medium.comยท7hยท
Discuss: Hacker News
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Feasibility of In-Ear Single-Channel ExG for Wearable Sleep~Monitoring in Real-World Settings
arxiv.orgยท5d
๐Ÿ‘‚Psychoacoustic Coding
A layered architecture for log analysis in complex IT systems
arxiv.orgยท4d
๐Ÿ‘๏ธObservatory Systems
๐ŸŒŸ Dream-to-Reality Planner: Where ๐ŸŽจ imagination meets ๐Ÿš€ execution
dev.toยท23hยท
Discuss: DEV
๐Ÿ›Digital humanities
AppWeaver AI
dev.toยท17hยท
Discuss: DEV
๐Ÿ“„Document Streaming
Quantum Key Distribution Resilience Against Jamming Attacks in Drone C2 Links: A Hybrid Optical-RF Approach
dev.toยท4dยท
Discuss: DEV
โš›๏ธQuantum Channels
I built "The Great Lock-In" app (currently trending on the App Store)
apps.apple.comยท3dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals