Red vs. Black
yegor256.com·1d
🔐Soviet Cryptography
GTI Asia China Expo 2025 Day 3: Rounding Off All The New Arcade Games In China
arcadeheroes.com·1d
🕹️Retro Gaming
What Happens After I'm Gone? The Future of the Online Me
btxx.org·2d
🏠Personal Archives
RIP pthread_cancel
eissing.org·1d·
📡Network Stack
Git's hidden simplicity: what's behind every commit
allvpv.substack.com·1d·
Discuss: Substack
🌳Git Internals
How Trump’s Hyundai immigration raid could blow up his economic agenda
the-independent.com·11h
🛡Cybersecurity
GOG shares their thoughts on preservation in the face of payment processor crackdowns
rockpapershotgun.com·1d·
Discuss: Hacker News
⚖️Game Preservation Ethics
Feross on Risky Business Weekly Podcast: npm’s Ongoing Supply Chain Attacks
socket.dev·4d·
Discuss: Hacker News
🎫Kerberos Attacks
You should be rewriting your prompts
maxleiter.com·15h·
Discuss: Hacker News
🧪Binary Fuzzing
Learning to fuzz with LibAFL by solving puzzles
github.com·1d·
🐛Fuzzing
BrandSight - AI Brand Monitoring
dev.to·1d·
Discuss: DEV
⚖️Feed Ranking
Wall Street Brunch: Now Is The Meeting Of The Fed Dissent
seekingalpha.com·19h
📡RSS
Smarter Apps with PostHog: Feature Flags & Analytics
dev.to·3d·
Discuss: DEV
🏺ZIP Archaeology
Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials
tenable.com·6d
🔐Archive Encryption
New Android RAT uses Near Field Communication to automatically steal money from devices
techradar.com·4d
🕵️Vector Smuggling
Troubleshooting with Gemini - Yuexin Li, Google
youtube.com·2d
🌊Streaming Systems
Mobile Social Engineering Escalates with Smishing, Vishing, and Quishing Trends
zimperium.com·5d
📼Cassette Hacking
Adaptive Decentralized Control of Simulated Digital Twins in Metaverse Manufacturing
dev.to·1d·
Discuss: DEV
Incremental Computation
AI browsers or agentic browsers: a look at the future of web surfing
malwarebytes.com·2d
🤖AI Curation
Gemini Bots for humanity
dev.to·1d·
Discuss: DEV
🤖AI Curation