A new home for Tor user documentation
blog.torproject.org·5d
📡DNS Archaeology
Flag this post
Semanticide
🧲Magnetic Philosophy
Flag this post
Gated DeltaNet (Linear Attention variant in Qwen3-Next and Kimi Linear)
🤖Grammar Induction
Flag this post
The rise of agentic AI in cybersecurity
techradar.com·34m
🎯Threat Hunting
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·3d
🛣️BGP Hijacking
Flag this post
Flying autonomous drones jointly transport loads
heise.de·2h
⚙️Tape Transport
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
🏺ZIP Archaeology
Flag this post
How to Data Engineer the ETLFunnel Way
🌊Stream Processing
Flag this post
Scaling Coding-Agent RL to 32x H100s. 160% Improvement on Stanford's TBench
⚔️Lean Tactics
Flag this post
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
🏺Protocol Archaeology
Flag this post
Simplifying Preference Elicitation in Local Energy Markets: Combinatorial Clock Exchange
arxiv.org·10h
🤝Consensus Algorithms
Flag this post
Hierarchy Elevates Social Reasoning
🌍Cultural Algorithms
Flag this post
From Connectivity to Capability: Rethinking the Digital Divide
internetsociety.org·3d
🌍Cultural Computing
Flag this post
Conduent January 2025 breach impacts 10M+ people
securityaffairs.com·7h
🛡Cybersecurity
Flag this post
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
theregister.com·16h
🔓Hacking
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.org·10h
🔍Vector Forensics
Flag this post
Loading...Loading more...