Feeds to Scour
SubscribedAll
Show HN: aero.zip - I over-engineered a file transfer service (E2EE, not P2P)
aero.zip·7h·
Discuss: Hacker News
🏺ZIP Archaeology
Preview
Report Post
How to Securely Store Secrets in Environment Variables
blog.miguelgrinberg.com·4h
🔐Archive Encryption
Preview
Report Post
A very unscientific guide to the security of various PQC algorithms
keymaterial.net·20h·
Discuss: Lobsters
🔲Lattice Cryptography
Preview
Report Post
Beyond Authentication — Exploiting a Nasty IDOR in Profile Update Functionality
infosecwriteups.com·1d
🔓Hacking
Preview
Report Post
A look at an Android ITW DNG exploit
googleprojectzero.blogspot.com·2d·
🖼️JPEG Forensics
Preview
Report Post
Targeted Data Protection for Diffusion Model by Matching Training Trajectory
arxiv.org·2d
🔍Vector Forensics
Preview
Report Post
REshare Ramblings - Bad Vibes with IDA
scrapco.de·1d
🔧KAITAI
Preview
Report Post
I now have an LTO library! (Need help with backup plans)
reddit.com·1d·
Discuss: r/homelab
💿Backup Strategies
Preview
Report Post
Tier list of Linux security mechanisms (2024)
blog.ce9e.org·4h·
Discuss: Lobsters
🛡️CLI Security
Preview
Report Post
When Marketing Exceeds the Age of the Universe
storagemath.com·5h·
Discuss: Hacker News
🛡️Preservation Logic
Preview
Report Post
What Is an Exploit? Vulnerabilities and Threat Mitigation
securityscorecard.com·2d
🔓Hacking
Preview
Report Post
Using .gov Email Addresses for Age and Information Verification
blog.certisfy.com·5h·
Discuss: Hacker News
🔐PKI Archaeology
Preview
Report Post
What I learned building a crash-safe WAL in Go (CRC, mmap, fsync, torn writes)
unisondb.io·20h·
Discuss: r/golang
📝Database WAL
Preview
Report Post
How phone ads exposed French intelligence officers, and what it means for your
proton.me·2d
🕳️Information Leakage
Preview
Report Post
IDA Pro String Heuristics
gabrielcybersecurity.com·2d
Format Verification
Preview
Report Post
Defrag.exfat Is Inefficient and Dangerous
github.com·1d·
Discuss: Hacker News
🗄️SQLite Internals
Preview
Report Post
Human Agency: Protect your documents with hidden Anti AI directives
human-agency.xyz·23h·
Discuss: Hacker News
📄PDF Archaeology
Preview
Report Post
Rich Headers: leveraging this mysterious artifact of the PE format
virusbulletin.com·1d·
Discuss: Hacker News
🏺Format Archaeology
Preview
Report Post
Privacy-Preserving Active Learning for wildfire evacuation logistics networks with zero-trust governance guarantees
dev.to·1d·
Discuss: DEV
🔒Privacy Preserving
Preview
Report Post
Playing with CP/M – part 1
eerielinux.wordpress.com·2d
🖥️Vintage Macintosh
Preview
Report Post