The Missing Ten Dollars Riddle
mindyourdecisions.com·1d
🔲Cellular Automata
Flag this post
FTC orders CafePress not to store security question answers in plaintext following breach
blog.passwordresearch.com·1d·
🔤EBCDIC Privacy
Flag this post
Continued testing 1130 MRAM board - dealing with the signal bounce and retriggering
rescue1130.blogspot.com·25m·
Circuit Archaeology
Flag this post
Great Singers on Great Singing
yuri.is·8h·
Discuss: Hacker News
👂Audio Evidence
Flag this post
BigBlueButton: Update fixes web conferencing system vulnerabilities
heise.de·1d
🔓Hacking
Flag this post
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·5d·
Discuss: Hacker News
🔐Capability Systems
Flag this post
A.I. Sure Looks Like a Bubble. Watch Out When It Pops
nytimes.com·14h·
Discuss: Hacker News
💎Information Crystallography
Flag this post
The company Discord blamed for its recent breach says it wasn't hacked
engadget.com·6h
🚀Indie Hacking
Flag this post
The Alien Artifact: DSPy and the Cargo Cult of LLM Optimization
data-monger.com·3d·
Discuss: Hacker News
🔍Vector Forensics
Flag this post
EU Launches New Push for Digital ID Age Checks and Big Tech Probe Under DSA
reclaimthenet.org·14h·
🛡Cybersecurity
Flag this post
AI weapons are dangerous in war. But saying they can't be held accountable misses the point
phys.org·2d
🔲Cellular Automata
Flag this post
Databite: A set of open-source integration libraries
github.com·2d·
🔗Topological Sorting
Flag this post
What six months of DORA tells us about the future of resilience
techradar.com·1d
💾Persistence Strategies
Flag this post
Concise Reasoning in the Lens of Lagrangian Optimization
arxiv.org·20h
💻Local LLMs
Flag this post
How AI Companionship Develops: Evidence from a Longitudinal Study
arxiv.org·20h
🔲Cellular Automata
Flag this post
TCMA: Text-Conditioned Multi-granularity Alignment for Drone Cross-Modal Text-Video Retrieval
arxiv.org·20h
📐Vector Similarity
Flag this post
Customer payment data stolen in Unity Technologies’s SpeedTree website compromise
securityaffairs.com·1d
🔓Hacking
Flag this post
Using AWS Identity Center (SSO) tokens to script across multiple accounts
dev.to·3d·
Discuss: DEV
🎫Kerberos Exploitation
Flag this post
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.to·4d·
Discuss: DEV
⚙️Proof Engineering
Flag this post
Automated Anomaly Detection & Calibration in Robotic Welding via Multi-Modal Data Fusion
dev.to·9h·
Discuss: DEV
👁️System Observability
Flag this post