Inside the Unified Log 4: Log entries
eclecticlight.coยท9h
๐Ÿ“Log Parsing
Delusions of a Protocol
jwz.orgยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Cool down with your Digital Dystopia, bro
dedoimedo.comยท4h
๐ŸงฒMagnetic Philosophy
They Have Waited Two Years for the Hostages. These Are Their Rituals.
nytimes.comยท1d
๐Ÿ”Soviet Cryptography
Thinking About Social Media
kevquirk.comยท7h
โš–๏ธFeed Ranking
โ€˜Obedient, yielding and happy to followโ€™: the troubling rise of AI girlfriends
theguardian.comยท6h
๐Ÿค–AI Curation
Photographic Revision vs. Reality
hackerfactor.comยท57mยท
Discuss: Hacker News
๐ŸŒˆColor Archaeology
Discord usersโ€™ data stolen by hackers in third-party data breach
bitdefender.comยท2h
๐ŸŽซKerberos Attacks
Bulk operations in Boost.Bloom
bannalia.blogspot.comยท2dยท
๐ŸŒธBloom Filters
Q-Learning with Shift-Aware Upper Confidence Bound in Non-Stationary Reinforcement Learning
arxiv.orgยท12h
๐ŸงฎKolmogorov Bounds
Taming Imperfect Process Verifiers: A Sampling Perspective on Backtracking
arxiv.orgยท12h
๐ŸงฎKolmogorov Complexity
Why LLMs Hallucinate on Emojis (And 4 Tokens That Break Production AI)
dev.toยท10hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Meta-Author's Notes: Codie's Cognitive Chronicles
dev.toยท13hยท
Discuss: DEV
๐Ÿง Intelligence Compression
Itโ€™s time the UK got proactive about software security
techradar.comยท2h
โ„๏ธNix Adoption
Detecting DLL hijacking with machine learning: real-world cases
securelist.comยท8h
๐ŸŽซKerberos Exploitation
Balloons carrying smuggled cigarettes over Lithuania closed Vilnius Airport for hours
the-independent.comยท21h
๐Ÿ•ต๏ธVector Smuggling
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.comยท1d
๐Ÿ•ต๏ธSteganographic Compression
Breaking Into HackTheBox: My Journey from Script Kiddie to Root
infosecwriteups.comยท9h
๐Ÿ”“Hacking
Assessment Twins: A Protocol for AI-Vulnerable Summative Assessment
arxiv.orgยท12h
๐Ÿ”ฒCellular Automata