Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·5d
🦠Parasitic Storage
Flag this post
Weekly Bookmarks
inkdroid.org·1d
🏠Homelab Archaeology
Flag this post
What Happened When Small-Town America Became Data-Center, USA
news.slashdot.org·5h
🌐Edge Preservation
Flag this post
SAS Controllers and Flashy Lights (2021)
🛠️Greaseweazle
Flag this post
The 1337 PNG Hashquine (2022)
🔐Hash Functions
Flag this post
2.7B Buildings
🌳B-tree Archaeology
Flag this post
Adding ISA Ports To Modern Motherboards
hackaday.com·13h
🧲RISC-V Preservation
Flag this post
Why your AI evals keep breaking
🔍Concolic Testing
Flag this post
Learn what generative AI can do for your security operations center
microsoft.com·2h
💾Persistence Strategies
Flag this post
ISPs more likely to throttle netizens who connect through carrier-grade NAT: Cloudflare
🌐DNS Security
Flag this post
Kitty Terminal 0.44 Released with Unicode 17 Support
linuxiac.com·1d
🖥️Terminal Emulators
Flag this post
‘TruffleNet’ Attack Wields Stolen Credentials Against AWS
darkreading.com·1d
🎫Kerberos Attacks
Flag this post
The Adata SD820 proved resilient for my drop and dunk tests, making it a great storage option for use in the field
techradar.com·2d
🔌Operating system internals
Flag this post
Why Most Manufacturers Still Trust 1980s Quality Control (and How AI Is Quietly Fixing It)
📏Code Metrics
Flag this post
Relation-Aware Bayesian Optimization of DBMS Configurations Guided by Affinity Scores
arxiv.org·1d
🚀Query Optimization
Flag this post
Sprout by Edera: UEFI Bootloader in Rust
🔒Secure Boot
Flag this post
Advice on Potential Server Upgrade
🖥Home Lab Setup
Flag this post
Loading...Loading more...