Things to look forward to
markjgsmith.comยท1d
๐ŸŽฏContent Recommendation
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ŸŽญCultural Informatics
Flag this post
The AI Security Playbook: Match Your Testing to Your Maturity
hackerone.comยท2d
๐Ÿ”Capability Systems
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.comยท1d
๐Ÿ”คEBCDIC Privacy
Flag this post
Information Literacy and Chatbots as Search
buttondown.comยท11hยท
Discuss: Hacker News
๐Ÿ“ฐRSS Reading Practices
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
dev.toยท1hยท
Discuss: DEV
๐Ÿง…Tor Networks
Flag this post
Mad drunk on the mead of poetry
blog.zarfhome.comยท1d
๐ŸงชCBOR Fuzzing
Flag this post
Attackers Can Use Poetry To Derail AI Safeguards
forbes.comยท2d
๐Ÿ–ฅ๏ธModern Terminals
Flag this post
HashiCorp Vault is overhyped, and Mozilla SOPS with KMS and Git is underrated
oteemo.comยท2dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Flag this post
AI-Powered Espionage Will Favor China
news.risky.bizยท3d
๐Ÿ”“Hacking
Flag this post
The Rise of the โ€˜Just in Caseโ€™ M.R.I.
nytimes.comยท19hยท
Discuss: Hacker News
โš–๏ธEmulation Ethics
Flag this post
Cypherpunks Hall of Fame
github.comยท3dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
fastercapital.comยท12hยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post
As AI systems increasingly permeate all aspects of our lives
dev.toยท13hยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
Flag this post
The Evolving Ethics of Medical Data Stewardship
arxiv.orgยท2d
โš–๏ธArchive Ethics
Flag this post
Evolution Strategies at the Hyperscale
eshyperscale.github.ioยท2dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Flag this post
Cryptographers Cancel Election Results After Losing Decryption Key
it.slashdot.orgยท1d
๐Ÿ”Quantum Cryptography
Flag this post
User Identity Isn't Complete Without Authorization
fusionauth.ioยท2dยท
๐Ÿ”Capability Systems
Flag this post
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
aws.amazon.comยท1d
๐ŸŒณArchive Merkle Trees
Flag this post
Moving Away from Google
roose.digitalยท1dยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post