Inside the Unified Log 4: Log entries
eclecticlight.co·4h
📝Log Parsing
Thinking About Social Media
kevquirk.com·2h
⚖️Feed Ranking
Arab Aspirations, Ayatollah Machinations, Sudan, and the Kurds…
newenglishreview.org·4h
🏺Kerberos Archaeology
sopass and cross-device syncing in a password manager
blog.liw.fi·2d
🔀CRDT
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.com·2d
🏴‍☠️Piracy
‘Obedient, yielding and happy to follow’: the troubling rise of AI girlfriends
theguardian.com·2h
🤖AI Curation
The dangerous intimacy of social location sharing
joinreboot.org·13h·
Discuss: Hacker News
🧲Magnetic Philosophy
Bulk operations in Boost.Bloom
bannalia.blogspot.com·1d·
🌸Bloom Filters
Israeli fire in the West Bank killed their kids. Palestinian families want to know why
the-independent.com·3h
📝ABNF Parsing
ShieldX - A Vietnamese developer's dream to make enterprise security accessible
dev.to·1h·
Discuss: DEV
🚀Indie Hacking
Q-Learning with Shift-Aware Upper Confidence Bound in Non-Stationary Reinforcement Learning
arxiv.org·7h
🧮Kolmogorov Bounds
Taming Imperfect Process Verifiers: A Sampling Perspective on Backtracking
arxiv.org·7h
🧮Kolmogorov Complexity
Why LLMs Hallucinate on Emojis (And 4 Tokens That Break Production AI)
dev.to·5h·
Discuss: DEV
💻Local LLMs
Meta-Author's Notes: Codie's Cognitive Chronicles
dev.to·8h·
Discuss: DEV
🧠Intelligence Compression
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·3h
🎫Kerberos Exploitation
Balloons carrying smuggled cigarettes over Lithuania closed Vilnius Airport for hours
the-independent.com·16h
🕵️Vector Smuggling
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.com·1d
🕵️Steganographic Compression
Breaking Into HackTheBox: My Journey from Script Kiddie to Root
infosecwriteups.com·4h
🔓Hacking
AI Generated Child Sexual Abuse Material - What's the Harm?
arxiv.org·7h
🔲Cellular Automata
Can Time Itself Form a Crystal? New Research Says Yes, in a Surprising Way
scitechdaily.com·13h
Time Crystals