See you at Transparency.dev
securedrop.org·1d
🔌Interface Evolution
Flag this post
Patching Android ARM64 library initializers for easy Frida instrumentation and debugging
blog.nviso.eu·2d
🎮Game Decompilation
Flag this post
Understanding stealthy BGP hijacking risk in the ROV era
blog.apnic.net·16h
🛣️BGP Hijacking
Flag this post
The Power of Why: Making Cybersecurity Training Stick
lmgsecurity.com·57m
🛡Cybersecurity
Flag this post
Show HN: Free YouTube Transcript Generator – 99% Accuracy, No Signup Required
📝Text Compression
Flag this post
Giving Up on Privacy (2011)
🏠Personal Archives
Flag this post
Why C variable argument functions are an abomination (and what to do about it)
🔗Concatenative Programming
Flag this post
Absolute Scale Corrupts (2019)
🔓Hacking
Flag this post
Reclaiming Data: Why Tech Needs Data Realism
hackernoon.com·10h
🧲Magnetic Philosophy
Flag this post
Aim-VI: A Vision for Independent AI Guided by Universal Moral Principles
⚖️Archive Ethics
Flag this post
Aimslate:Ai Image Translator
🤖AI Translation
Flag this post
Building a Semantic Search Engine for Any Website Using React, Django & Milvus Lite
🌀Brotli Dictionary
Flag this post
Hayden, Michael V. - Playing to the edge. [Elektronisk resurs] : American intelligence in the age of terror / Michael V. Hayden.
libris.kb.se·1d
🕵Intelligence
Flag this post
Mysterious Elephant: a growing threat
securelist.com·1d
🚀Indie Hacking
Flag this post
A sophisticated nation-state actor breached F5 systems, stealing BIG-IP source code and data on undisclosed flaw
securityaffairs.com·20h
🔓Hacking
Flag this post
Source-Free Object Detection with Detection Transformer
arxiv.org·2d
🤖Advanced OCR
Flag this post
CSI Prediction Using Diffusion Models
arxiv.org·2d
ℹ️Information Theory
Flag this post
Update Microsoft Windows Now — New 2 Week Security Deadline Confirmed
forbes.com·15h
🔓Hacking
Flag this post
Loading...Loading more...