Explainer: Permissions, privacy and TCC
eclecticlight.co·19h
🏠Personal Archives
Flag this post
A defender’s guide to phishing
redcanary.com·2d
🎯Threat Hunting
Flag this post
Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.biz·4d
🛡Cybersecurity
Flag this post
Man Pages (Part 1)
📄PostScript
Flag this post
Pool allocator in C++23 for simulations / game engines - faster than std::pmr
🧠Memory Allocators
Flag this post
The Case for Boring APIs
⚡gRPC
Flag this post
Flatpak Happenings
📦Deflate
Flag this post
ESET APT Activity Report Q2 2025–Q3 2025
welivesecurity.com·2d
🛡Cybersecurity
Flag this post
2025 Meditation App Landscape: Comprehensive Review of Top Mindfulness Platforms
📰Feed Readers
Flag this post
Great, now even malware is using LLMs to rewrite its code, says Google, as it documents new phase of 'AI abuse'
🔓Hacking
Flag this post
Microsoft's data sovereignty: Now with extra sovereignty!
theregister.com·1d
🖥️Self-hosted Infrastructure
Flag this post
Decoupled Entropy Minimization
arxiv.org·2d
🧠Machine Learning
Flag this post
Flow control in switch ASICs: Part 3 — Notes on flow control
blog.apnic.net·1d
🌊Stream Processing
Flag this post
🔑 Own It or Lose It | The Real Power Behind “Not Your Keys, Not Your Coins”
🔗Blockchain Archives
Flag this post
Mind the Gap: Missing Cyber Threat Coverage in NIDS Datasets for the Energy Sector
arxiv.org·4d
🏠Homelab Pentesting
Flag this post
Developer Case Study: Cursor and Claude Code Suggested Building a Proxy. Shotgun CLI Found LiteLLM Instead.
👁️Observatory Systems
Flag this post
Best way to archive old VMs?
🏠Homelab Preservation
Flag this post
Enhanced Radiation Sterilization Verification via Hyperdimensional Data Fusion and Bayesian Calibration
💾Floppy Imaging
Flag this post
University of Pennsylvania confirms recent cyberattack led to major data theft
techradar.com·2d
🛡Cybersecurity
Flag this post
BSD Weeklu issue 252
discoverbsd.com·3d
🔌Operating system internals
Flag this post
Loading...Loading more...