Securing AI Workloads in Kubernetes: Why Traditional Network Security Isn’t Enough
tigera.io·3d
👁️Observatory Systems
tmux-plugins/tmux-resurrect
github.com·3d
🕵️Format Recovery
Point, Don't Point
ilovetypography.com·1d·
Discuss: Hacker News
📜Document Paleography
Death to Type Classes
jappie.me·2d·
Discuss: Hacker News
🧠Lisp Dialects
original ↗
raymondcamden.com·2d·
Discuss: Hacker News
📄PostScript
I can't change people's opinions about me - Fernandes in his own words
bbc.com·1d
📡Information theory
UTF-8 is a Brilliant Design
iamvishnu.com·2d·
🔤Character Encoding
On discourse and decentralisation
connectedplaces.online·3d·
Discuss: Hacker News
🤝Distributed Consensus
Attackers hijacked popular NPM packages to replace crypto wallet addresses
exaforce.com·5d·
Discuss: Hacker News
🎫Kerberos Attacks
ImageSlim, an open-source, free Mac compression tool on GitHub
github.com·2d·
Discuss: Hacker News
🍎Apple Archive
Senator blasts Microsoft for 'dangerous, insecure software' that helped pwn US hospitals
theregister.com·3d
🛡Cybersecurity
David Ellison shows he's serious about fighting Netflix and Disney for Hollywood's crown
businessinsider.com·2d
🔍BitFunnel
Incorporating AI Incident Reporting into Telecommunications Law and Policy: Insights from India
arxiv.org·2d
📝ABNF Parsing
Host Header Injection - silverstripecmsv6.0.0
seclists.org·5d
🌐DNS Security
Encyclopedia Britannica and Merriam-Webster sue Perplexity AI for copyright and trademark infringement
theverge.com·2d
Proof Automation
Huge NPM Supply-Chain Attack Goes Out With Whimper
darkreading.com·5d
🔓Hacking
An Incredible Lifeform Is Evolving at Lightning Speed—Faster Than We Ever Imagined Possible
popularmechanics.com·1d
🌡️Preservation Physics
How should I set up my two systems?
reddit.com·1d·
Discuss: r/homelab
🖥Home Lab Setup