AI Ethics and the Humanities: A Perspective from Buddhist Studies
digitalorientalist.comยท2d
โš–๏ธEmulation Ethics
Flag this post
Hacker Review of Ghost in the Shell (1995)
hackerfiction.netยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท3d
๐Ÿ”Quantum Security
Flag this post
Banned by Musk, Threatened by Krebs
jpendleton.substack.comยท17hยท
Discuss: Substack
๐ŸŽซKerberos Attacks
Flag this post
The Droid Wars: Breaking up an AIโ€‘orchestrated cyber fraud campaign
factory.aiยท2dยท
Discuss: Hacker News
๐ŸŽซKerberos History
Flag this post
my journey to accepting that you wont know it all
blog.prdai.devยท21hยท
๐ŸŽฏGradual Typing
Flag this post
Ask HN: How can you search your personal data?
news.ycombinator.comยท3dยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post
DeepSeek-R1 Generates Insecure Code with Politically Sensitive Terms
heise.deยท2d
๐ŸงชBinary Fuzzing
Flag this post
Watching People Experience Their AI Eureka Moment
rickmanelius.comยท3hยท
Discuss: Hacker News
๐ŸŒCultural Algorithms
Flag this post
Bottled Water Isnโ€™t as Safe as You Think, Study Warns
scitechdaily.comยท5h
๐Ÿ’งLiquid Types
Flag this post
Introducing Filecoin Onchain Cloud: Verifiable, Developer-Owned Infrastructure
hackernoon.comยท4d
๐Ÿ”—Blockchain Archives
Flag this post
Automated Identification & Alignment of Genomic Sequence Anomalies via Hyperdimensional Mapping
dev.toยท2dยท
Discuss: DEV
๐ŸงฌCopy Number Variants
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.orgยท2d
๐Ÿค–Advanced OCR
Flag this post
How to protect your business files from AI security threats
proton.meยท5d
๐Ÿ”Archive Encryption
Flag this post
AI Isn't "Smart": The Myth of Sentience and the Energy of a Black Hole
dev.toยท7hยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
Flag this post
A time for monsters: Organizational knowing after LLMs
arxiv.orgยท2d
๐Ÿ”ขDenotational Semantics
Flag this post
PersonaDrift: A Benchmark for Temporal Anomaly Detection in Language-Based Dementia Monitoring
arxiv.orgยท2d
๐Ÿง Intelligence Compression
Flag this post
Hack the Box Starting Point: Responder
infosecwriteups.comยท9h
๐ŸŽฏNTLM Attacks
Flag this post
Beyond the Fear: How the Dark Web Became My Secret Weapon for a Azure AD Takeover ๏ธโ€โ™‚๏ธโœจ
infosecwriteups.comยท8h
๐Ÿ”“Hacking
Flag this post