Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·22h
💎Information Crystallography
On the Health Effects of Electromagnetic Radiation
huijzer.xyz·1h
🌡️Preservation Physics
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.com·2d
🌐Network Security
Paper Highlights - Do Password Managers Improve Password Hygiene?
blog.passwordresearch.com·7h·
🔓Password Cracking
GitHub Copilot 'CamoLeak' AI Attack Exfiltrates Data
darkreading.com·1d
🚀Indie Hacking
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·3d
📦Container Security
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.com·17h
🔍NTLM Forensics
Hardening SSH with Touch-Verified Hardware Keys
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.org·1d
🕵️Vector Smuggling
Mirror Image Tool – Flip images in browser with complete privacy
news.ycombinator.com·1d·
Discuss: Hacker News
🔍BitFunnel
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·14h·
Discuss: Hacker News
🛡️RISC-V Security
Compliance of mobile games with loot box probability disclosure law in Korea
sciencedirect.com·1d·
Discuss: Hacker News
⚖️Game Preservation Ethics
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·17h·
Discuss: Hacker News
🎫Kerberos Exploitation
1k LEDs Is No Limit
xayax.net·1d·
Homebrew CPUs
Work in content? You should be using AI for alt text
tk.gg·1d·
Discuss: Hacker News
📄PostScript
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·18h
🔓Hacking
Padding
reddit.com·4h·
Discuss: r/golang
🔧KAITAI
Revisiting Karpathy's 'Unreasonable Effectiveness of Recurrent Neural Networks'
gilesthomas.com·7h·
Discuss: Hacker News
🎧Learned Audio
Phones as a Fortress: 4th Amendment Castle Doctrine for the "Digital Home"
computerweekly.com·15h·
Discuss: Hacker News
🧲Magnetic Philosophy