Somatic mutation and selection at population scale
nature.com·19h
🧬Copy Number Variants
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·16h
🌐WARC Forensics
Running new applications on old glibc
lightofdawn.org·6h·
Discuss: Hacker News
🔗Static Linking
The ClickFix Factory: First Exposure of IUAM ClickFix Generator
unit42.paloaltonetworks.com·1d
🔍BitFunnel
What is Mobile Threat Defense (MTD)?
jamf.com·3h
🎯Threat Hunting
The best digital frames for 2025
engadget.com·2h
Bidirectional Programming
Fix WestData SN550/SN570 SSD slow read problem
blog.est.im·9h
💿WORM Storage
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.com·2d
🔐Quantum Security
Need to sanity check my backup plan before I implement it
youtube.com·1d·
Discuss: r/homelab
💿Backup Strategies
CodeSOD: A JSON Serializer
thedailywtf.com·5h
📦Deflate
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·6h
🖼️JPEG XL
The Bit Shift Paradox: How "Optimizing" Can Make Code 6× Slower
hackernoon.com·1d
🧮Compute Optimization
Zippers: Making Functional "Updates" Efficient (2010)
goodmath.org·30m·
Discuss: Hacker News
🌳Incremental Parsing
Westin's Four States of Privacy
marcusolsson.dev·30m·
Discuss: Hacker News
🔒Privacy Archives
Why Low-Precision Transformer Training Fails: An Analysis on Flash Attention
huggingface.co·4h·
Discuss: Hacker News
📊Learned Metrics
Crimson Collective: A New Threat Group Observed Operating in the Cloud
rapid7.com·1d
🎫Kerberos Exploitation
The Next Computing Revolution: Bringing Processing Inside Memory
computer.org·2d·
Discuss: Hacker News
Hardware Transactional Memory
If you use Claude Code with Codex or Cursor: ln -s AGENTS.md CLAUDE.md
coding-with-ai.dev·16h·
Discuss: Hacker News
🦠Parasitic Archives
Cache smuggling: When a picture isn't a thousand words
expel.com·18h·
Discuss: Hacker News
💣ZIP Vulnerabilities