Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
dev.toยท1hยท
Discuss: DEV
๐Ÿง…Tor Networks
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.comยท10hยท
๐Ÿ‘‘RISC-V Privilege
Flag this post
Python Certifi and Custom CAs
zufallsheld.deยท15hยท
Discuss: Hacker News
๐ŸงชCBOR Fuzzing
Flag this post
NordPass Review: An Almost Flawless Password Manager
wired.comยท1d
โณTime Capsule Networks
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.comยท2dยท
๐ŸŒWebRTC Archives
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Ÿ”Archive Encryption
Flag this post
eBPF Rootkit
synacktiv.comยท14hยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
reddit.comยท1dยท
Discuss: r/golang
๐ŸŽซKerberos History
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movยท11hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Flag this post
Lockzo AL501 3-in-1 smart door lock review with the Tuya mobile app
cnx-software.comยท1h
๐Ÿ Home Automation
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.proยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Programs
Flag this post
Langโ€™s theorem โ€” Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comยท11h
ฮปLambda Encodings
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐ŸŽฏNTLM Attacks
Flag this post
Three security invariants could prevent 65% of preaches
blog.apnic.netยท3d
๐Ÿ”“Hacking
Flag this post
Kyber vs. RSA-2048
blog.ellipticc.comยท2dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท18h
๐ŸŽซKerberos Attacks
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.ioยท1d
๐Ÿ’งLiquid Types
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comยท1d
๐Ÿ Homelab Security
Flag this post