Unaccountable systems
whynothugo.nl·1d
🎫Kerberos Attacks
The myth of sovereign AI: Countries rely on U.S. and Chinese tech
restofworld.org·23h
🏠Homelab Federation
Open source all the way down at APNIC 60
blog.apnic.net·2d
🛡️eBPF Programs
Maybe Everything is OSS Now (but Not F)
jeffwofford.com·23h·
Discuss: Hacker News
🔓Open Source Software
The Scam Called "You Don't Have to Remember Anything"
zettelkasten.de·2d·
🧠Personal Knowledge Base
Semlib: LLM-powered Data Processing
anishathalye.com·2d·
Discuss: Lobsters
🔗Constraint Handling
TryQuiet/quiet
github.com·5d
🌐WebRTC Archives
Anti-DDoS outfit walloped by record packet flood
theregister.com·1d
🎫Kerberos Attacks
1,200 undergrads hung out to dry after jailbreak attack on laundry machines
theregister.com·19h
🏠Home Automation
AskDoc -- Identifying Hidden Healthcare Disparities
arxiv.org·1d
🏛Digital humanities
Jaguar Land Rover backtracks, says hackers may have taken some data
techradar.com·1d
🔓Hacking
8th September – Threat Intelligence Report
research.checkpoint.com·4d
🔓Hacking
Watch: Footage shows second claimed attack on Greta Thunberg Gaza flotilla
bbc.com·2d
🎞️MKV Forensics
Real-Time Atmospheric Dust Characterization via Deep Hyperspectral Analysis & Dynamic Particle Classification
dev.to·1d·
Discuss: DEV
🌈Spectroscopy
Personalized Sleep Prediction via Deep Adaptive Spatiotemporal Modeling and Sparse Data
arxiv.org·1d
🎙️Whisper
Salty2FA Takes Phishing Kits to Enterprise Level
darkreading.com·3d
🔓Hacking
OpenAI's Sam Altman Sees a Future Beyond GPT-5 With Collective 'Superintelligence'
dev.to·1d·
Discuss: DEV
Time Capsule Networks
Automated Radiotracer Distribution Quantification via Multi-Modal Graph Analysis in WBA
dev.to·3d·
Discuss: DEV
🔍Vector Forensics
An Analysis of Layer-Freezing Strategies for Enhanced Transfer Learning in YOLO Architectures
arxiv.org·4d
🧮Kolmogorov Bounds