I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated
🧪Protocol Fuzzing
Flag this post
You Still Shouldn’t Use a Browser Password Manager
wired.com·9h
🔓Hacking
Flag this post
llama2 in Rust, with Metal and Rayon
jakub-m.github.io·1d
🦀Embedded Rust
Flag this post
BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·2d
🔐Archive Encryption
Flag this post
Gmail Passwords Confirmed As Part Of 183 Million Account Data Breach
forbes.com·21h
🔓Hacking
Flag this post
By the power of grayscale!
zserge.com·21h
🌀Fractal Compression
Flag this post
A moonlit week
λLambda Encodings
Flag this post
Safepay ransomware group claims the hack of professional video surveillance provider Xortec
securityaffairs.com·4h
🔓Hacking
Flag this post
CRYPT: synthesiser plugin
vitling.xyz·15h
🎹MIDI Archaeology
Flag this post
SQL Mandelbrot Benchmark
🗃️Database Storage
Flag this post
Weekly Update 475
troyhunt.com·1d
🏺Kerberos Archaeology
Flag this post
Modern perfect hashing
🧪Binary Fuzzing
Flag this post
Ken Thompson's "Trusting Trust" compiler backdoor - Now with the actual source code (2023)
💻Programming languages
Flag this post
#26 Repunit and Residual... History and Etymology of Math Terms
🎯Arithmetic Coding Theory
Flag this post
Error'd: It's Daniel Time Again!
thedailywtf.com·2d
🔓Hacking
Flag this post
Hacking the Color BASIC PRINT command – part 3
subethasoftware.com·2d
📺VT100
Flag this post
The difference between passwords and passkeys – and the ‘clear winner’ for security
the-independent.com·2d
🔐Quantum Security
Flag this post
Loading...Loading more...