Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท12h
๐Ÿ›กCybersecurity
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.comยท4h
๐ŸŽซKerberos Attacks
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
darkreading.comยท5h
๐Ÿ”“Hacking
Why โ€˜security as by-productโ€™ is no replacement for modern tooling
reversinglabs.comยท1d
๐Ÿ”Capability Systems
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.orgยท21h
๐Ÿ•ต๏ธVector Smuggling
Quantum Weaving: A New Era of Multimodal AI by Arvind Sundararajan
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Quantum Cryptography
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท15h
๐Ÿ”—Hash Chains
Signal secures its chats against quantum computers
heise.deยท4d
๐Ÿ”Quantum Cryptography
Mechanisms for Quantum Advantage in Global Optimization of Nonconvex Functions
arxiv.orgยท3d
โš›๏ธQuantum Algorithms
Quantum Sensors Sidestep the Heisenberg Uncertainty Principle
spectrum.ieee.orgยท4dยท
Discuss: r/technews
โš›๏ธQuantum Tape
BQN "Macros" with โ€ขDecompose (2023)
saltysylvi.github.ioยท3hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท2dยท
๐Ÿ”‘Cryptographic Protocols
Dynamic Scheduling in Fiber and Spaceborne Quantum Repeater Networks
arxiv.orgยท2d
โš›๏ธQuantum Tape
Evaluating Gemini 2.5 Deep Think's math capabilities
epoch.aiยท11hยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
Show HN: Velocity is a post-quantum transport protocol
projectvelocity.orgยท1hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.orgยท7hยท
Discuss: Hacker News
๐Ÿ›ก๏ธRISC-V Security
Hardware Vulnerability Allows Attackers to Hack AI Training Data โ€“ NC State News
news.ncsu.eduยท4hยท
Discuss: Hacker News
๐Ÿ”RISC-V Cryptography
MIT physicists improve the precision of atomic clocks
news.mit.eduยท1dยท
Discuss: Hacker News
โฐTime Crystals