Some Pirates Use Religion as an Excuse, For Others Itβs a Moral Barrier
torrentfreak.comΒ·39m
π΄ββ οΈPiracy
Flag this post
The Structure of Data
πData structures
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.ioΒ·2d
πCBOR
Flag this post
Dynamics in Jordan Algebras
golem.ph.utexas.eduΒ·8h
πΈοΈTensor Networks
Flag this post
0055: consulting, sql needed structure, slow forum, on the line, out of thin air, papers, other stuff
scattered-thoughts.netΒ·1d
π¦Rust Macros
Flag this post
EthVault: A Secure and Resource-Conscious FPGA-Based Ethereum Cold Wallet
arxiv.orgΒ·4d
πStream Ciphers
Flag this post
EY 4TB Data Leak
πHacking
Flag this post
AI as Muse: Unlocking Mathematical Secrets Through Collaborative Discovery
πMathematical Art
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comΒ·2d
πHacking
Flag this post
Vibecoding my way to a crit on GitHub
βοΈNix Flakes
Flag this post
NetBSD NAT64 Protocol Translation Enhancements Part 2
discoverbsd.comΒ·1d
π‘οΈeBPF Security
Flag this post
Algorithmic Constraints on Multiverse Exploration via Compactified Topological Spaces
πDifferential Geometry
Flag this post
Covert Surveillance in Smart Devices: A SCOUR Framework Analysis of Youth Privacy Implications
arxiv.orgΒ·4d
π³οΈInformation Leakage
Flag this post
[GoGreement] A new linter that can help enforce interface implementation and immutability
πLinear Types
Flag this post
Another audit, same result - Mullvad proven secure and log-free in latest audit check
techradar.comΒ·4d
β
Archive Fixity
Flag this post
Local Digital Economy
π°RSS Archaeology
Flag this post
Loading...Loading more...