Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·10h·
Discuss: Hacker News
🛡️RISC-V Security
Announcing coreboot 25.09 release
blogs.coreboot.org·5h
🔌Operating system internals
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.org·1d
🕵️Vector Smuggling
The Why of PGP Authentication
articles.59.ca·16h
🔑Cryptographic Protocols
Hardware Vulnerability Allows Attackers to Hack AI Training Data – NC State News
news.ncsu.edu·8h·
Discuss: Hacker News
💻Local LLMs
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·19h
💎Information Crystallography
SSH Security: Why You Should Touch to Verify
ubicloud.com·21h·
Discuss: Hacker News
🔒Hardware Attestation
Progress being made in porting AMD OpenSIL Turin PoC to Coreboot in a Gigabyte MZ33-AR1
blog.3mdeb.com·8h·
🖥️Terminal Renaissance
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.com·4d
🔐Quantum Security
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4d
🔐Cryptographic Archaeology
Linux Now Disabling TPM Bus Encryption By Default For Performance Reasons
phoronix.com·10h
🔍eBPF
Linux SBCs for development + RE
zetier.com·1d
🎯Emulator Accuracy
The Chip That Spoke Lisp
jxself.org·3d
🤖Lisp Machines
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
darkreading.com·9h
🔓Hacking
Experimenting with ACL2 and Claude Code
mikedodds.org·16h·
Discuss: Hacker News
👑Isabelle
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
Apple doubles maximum bug bounty to $2M for zero-click RCEs
securityaffairs.com·5h
🛡️ARM TrustZone
Enhanced SoC Design via Adaptive Topology Optimization with Reinforcement Learning
dev.to·1d·
Discuss: DEV
🧩RISC-V
Avalue EPC-ASL Intel N97 fanless industrial mini PC is designed for 24/7 operation
cnx-software.com·1d
🔌Single Board PC
A Function Generator From The Past
hackaday.com·10h
Circuit Archaeology