Password Authentication, Zero Knowledge, Secure Login, Cryptographic Exchange

Python Certifi and Custom CAs
zufallsheld.de·13h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
reddit.com·1d·
Discuss: r/golang
🎫Kerberos History
Flag this post
NordPass Review: An Almost Flawless Password Manager
wired.com·1d
Time Capsule Networks
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.com·7h·
👑RISC-V Privilege
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.com·2d·
🌐WebRTC Archives
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.to·15h·
Discuss: DEV
📡Network Monitoring
Flag this post
eBPF Rootkit
synacktiv.com·12h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·8h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.pro·1d·
Discuss: Hacker News
🛡️eBPF Programs
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·9h
λLambda Encodings
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.com·3d
🎯NTLM Attacks
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.io·1d
💧Liquid Types
Flag this post
Securing the Win: What Cybersecurity Can Learn From the Paddock
darkreading.com·2d
💾Persistence Strategies
Flag this post
Kyber vs. RSA-2048
blog.ellipticc.com·2d·
Discuss: Hacker News
🔐Quantum Security
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·16h
🎫Kerberos Attacks
Flag this post
Show HN: Agent Network Protocol (ANP),Similar to an A2A
github.com·16h·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
RuBee
computer.rip·7h
📻Homebrew Protocols
Flag this post