The very simple ways to reduce the risk of being burgled
the-independent.comยท3h
๐Ÿ Home Automation
sopass and cross-device syncing in a password manager
blog.liw.fiยท3d
๐Ÿ”€CRDT
The ReD Hat Consulting Breach โ€“ An Analysis
digitalforensicsmagazine.comยท3h
๐Ÿ”“Hacking
Zero Trust: a proven solution for the new AI security challenge
techradar.comยท4h
โšกProof Automation
Unlimited access to Docker Hardened Images: Because security should be affordable, always
docker.comยท16h
๐Ÿ“ฆContainer Security
They're inโ€ฆnow what? How to stop lateral movement when the phish bites
runzero.comยท21h
๐ŸŽซKerberos Attacks
Weekly: Questions and advice
reddit.comยท3hยท
Discuss: r/kubernetes
๐Ÿ“ฐRSS Reading Practices
Bamboo: LLM-Driven Discovery of API-Permission Mappings in the Android Framework
arxiv.orgยท9h
๐Ÿ”’WASM Capabilities
How Weak Social Media Passwords Can Be Cracked with SocialBox in Termux
hackernoon.comยท12h
๐Ÿ”“Password Cracking
Googleโ€™s CodeMender: More Dangerous Than Helpful?
nocomplexity.comยท3hยท
Discuss: Hacker News
๐Ÿ”“Hacking
A Solution to the Paperclip Problem
link.springer.comยท11hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท1dยท
๐Ÿ”PKI Archaeology
Say No to Mass Surveillance
threema.comยท1hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Sia Foundationโ€™s Nonprofit Cloud Model Redefines Data Ownership and Privacy
hackernoon.comยท1d
๐Ÿ Homelab Federation
Bond-Centered Molecular Fingerprint Derivatives: A BBBP Dataset Study
arxiv.orgยท9h
๐Ÿ”Vector Forensics
Privacy-Preserving Federated Learning with Homomorphic Encryption for Secure Medical Image Segmentation
dev.toยท5dยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Functional Programming Through the Lens of a Philosopher and Linguist
gotopia.techยท8hยท
Discuss: Hacker News
๐Ÿ› Language Design
Fire destroys S. Korean government's cloud storage system, no backups available
dev.toยท1dยท
Discuss: DEV
๐Ÿ’พPersistence Strategies