Surveillance: State Premiers Push for "Swift" Data Retention
heise.de·20h
🔐Swedish Cryptography
Flag this post
Vulnerability Management – Process Perspective
blog.nviso.eu·9h
🔐Capability Systems
Flag this post
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
securelist.com·14h
🚀Indie Hacking
Flag this post
The art and science of effective security storytelling
redcanary.com·1d
🔗Data Provenance
Flag this post
First Wap: A Surveillance Computer You’ve Never Heard Of
schneier.com·1d·
Discuss: Hacker News
📊PCAP Analysis
Flag this post
The Lost War of Information Technology
unworkableideas.com·5h·
Discuss: Hacker News
🧲Magnetic Philosophy
Flag this post
A phishing with invisible characters in the subject line, (Tue, Oct 28th)
isc.sans.edu·8h
🔤Character Encoding
Flag this post
The Machine Learning Lessons I’ve Learned This Month
towardsdatascience.com·23h
🚀SIMD Text Processing
Flag this post
Energy-Efficient UAV-Enabled MEC Systems: NOMA, FDMA, or TDMA Offloading?
arxiv.org·13h
ℹ️Information Theory
Flag this post
Jailbreak Mimicry: Automated Discovery of Narrative-Based Jailbreaks for Large Language Models
arxiv.org·13h
🧪Binary Fuzzing
Flag this post
Launching Lycan – a search tool for your likes
journal.mackuba.eu·21h·
Discuss: Hacker News
🌀Brotli Dictionary
Flag this post
"use workflow": Understanding Directives
useworkflow.dev·21h·
Discuss: Hacker News
🐚Shell Monads
Flag this post
The Impossible Optimization, and the Metaprogramming to Achieve It
verdagon.dev·1d·
🧪Binary Fuzzing
Flag this post
Scalable Oversight via Partitioned Human Supervision
arxiv.org·13h
Effect Handlers
Flag this post
Far from the Shallow: Brain-Predictive Reasoning Embedding through Residual Disentanglement
arxiv.org·13h
🔲Cellular Automata
Flag this post
How to Scale LLM Apps Without Exploding Your Cloud Bill
hackernoon.com·1d
📄Text Chunking
Flag this post
My Rough and Incomplete Back End Developer Skill Tree
iainschmitt.com·3h·
Discuss: Hacker News
🔩Systems Programming
Flag this post
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
malwaretech.com·3d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·1d
🧮Algebraic Datatypes
Flag this post