Lisa Fagin Davis’ “The Materiality of the Voynich Manuscript”…
ciphermysteries.com·5h
🏰Manuscript Networks
How the Math That Powers Google Foresaw the New Pope
scientificamerican.com·6h
⚖️Feed Ranking
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·1d
💎Information Crystallography
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.com·2d
🌐Network Security
Thumbing through the DNS Trail of the TAOTH Campaign
circleid.com·1h
📡DNS Archaeology
GitHub Copilot 'CamoLeak' AI Attack Exfiltrates Data
darkreading.com·1d
🚀Indie Hacking
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·8h·
Discuss: Hacker News
🔗Data Provenance
Cranemail: $75 Lifetime email host, 250gb storage, unlimited domains and aliases
namecrane.com·34m·
Discuss: Hacker News
🏠Homelab Preservation
Let’s talk about LLM guardrails
blog.adnansiddiqi.me·7h·
Discuss: Hacker News
🎯Proof Tactics
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·2d·
Discuss: Hacker News
🔐Capability Systems
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·1d·
Discuss: Hacker News
🚀Indie Hacking
6 Best Carpet Cleaners (2025), Tested and Reviewed
wired.com·2h
📦Deflate
Kurzgesagt - In a Nutshell: AI Slop Is Destroying The Internet
dev.to·3h·
Discuss: DEV
📰Content Curation
Writing regex is pure joy. You can't convince me otherwise.
triangulatedexistence.mataroa.blog·1d·
Format Verification
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·13h·
Discuss: DEV
🔍Vector Forensics
Westin's Four States of Privacy
marcusolsson.dev·2d·
Discuss: Hacker News
🔒Privacy Archives
Sora Watermark Remover
sorawatermarkremover.art·3h·
Discuss: Hacker News
📼Retro Games
Hacking the Humane AI Pin
writings.agg.im·3d·
Discuss: Hacker News
🛡️ARM TrustZone
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·1d·
Discuss: r/LLM
💻Local LLMs