Password Authentication, Zero Knowledge, Secure Login, Cryptographic Exchange

How I Bypassed Random Medical Center Assignment During Appointment Booking
infosecwriteups.com·1d
🎫Kerberos Attacks
Online Identity Verification with the Digital Credentials API
webkit.org·1d·
🔐PKI Archaeology
Satellite Warfare – An Analysis
digitalforensicsmagazine.com·22h
🎯Threat Hunting
Fun with HyperLogLog and SIMD
vaktibabat.github.io·23h·
📊HyperLogLog
Personal data storage is an idea whose time has come
blog.muni.town·1h·
Discuss: Hacker News
🧲Magnetic Philosophy
Reimplementing PKCS#11 Module
blog.ubavic.rs·1d·
Discuss: Hacker News
🔐CBOR
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.com·1d
🏴‍☠️Piracy
MCP: Best Practices for Secure Agent-Database Interoperability
thenewstack.io·2d
🌳Archive Merkle Trees
Mic-E-Mouse, Covert Eavesdropping Through Computer Mice
sites.google.com·10h·
Discuss: Hacker News
📼Cassette Hacking
The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security
dev.to·1d·
Discuss: DEV
🤖Network Automation
Mariatta: Disabling Signup in Django allauth
mariatta.ca·1d
🎯NTLM Attacks
Myth Busters: Is Rust a Slam Dunk?
infoq.com·16h·
Discuss: Hacker News
🦀Embedded Rust
WireGuard topologies for self-hosting at home
garrido.io·1d·
📡Network Protocol Design
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·2d
🔧Binary Parsers
Advanced Grid-Scale Battery Standard Harmonization via AI-Driven Predictive Modeling
dev.to·1h·
Discuss: DEV
🎯Arithmetic Coding Theory
Best open source auth tools
cerbos.dev·2d·
🔐Capability Systems
AuditKit: Multi-framework compliance scanner that shows what auditors need
auditkit.io·9h·
Discuss: Hacker News
🕵️Penetration Testing
Securing MCP Servers with Spring AI
spring.io·1d·
Discuss: Hacker News
gRPC