Open Comments Rewind: E is for Exploring The Open Group OSDUยฎ Management Committee (OMC) with Einar Landre
blog.opengroup.orgยท6h
๐Ÿ”“Open Source Software
Flag this post
Mobile Bots Are Outsmarting Traditional Defenses & Enterprises Are Paying the Price
zimperium.comยท1d
๐ŸŽซKerberos Attacks
Flag this post
Ancient DNA may rewrite the story of Iceland's earliest settlers
newscientist.comยท8h
๐Ÿ“ฐRSS Archaeology
Flag this post
Show HN: I gamified passwords to make them easier to remember
passwordgame.apps.benthayer.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Flag this post
Life Before Earth
arxiv.orgยท1dยท
Discuss: Hacker News
๐ŸฆดBinary Paleontology
Flag this post
Credentials Evidence or Simulate
preludes.euยท2dยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Flag this post
BoxLambda OS Software Architecture, First Draft
epsilon537.github.ioยท16hยท
Discuss: Hacker News
โš™๏ธOperating System Design
Flag this post
OpenTelemetry: Escape Hatch from the Observability Cartel
oneuptime.comยท1dยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
Judge in Comey case scolds prosecutors as he orders them to produce records from probe
the-independent.comยท4h
๐Ÿ—œ๏ธZIP Forensics
Flag this post
Apache Arrowโ€™s Final Frontier: Replacing Outdated Database Drivers
thenewstack.ioยท2d
๐Ÿ—„๏ธDatabase Internals
Flag this post
The internet was made for privacy
doctorow.medium.comยท5d
๐ŸงฒMagnetic Philosophy
Flag this post
ML Library Comparison: Burn vs Candle
reddit.comยท6hยท
Discuss: r/rust
๐Ÿฆ€Rust Macros
Flag this post
An eBPF Loophole: Using XDP for Egress Traffic
loopholelabs.ioยท1dยท
Discuss: Hacker News
๐Ÿ”eBPF
Flag this post
Theft at the Louvre, the password was the museum's name
decripto.orgยท8hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท3d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Hydra: Dual Exponentiated Memory for Multivariate Time Series Analysis
arxiv.orgยท1d
๐Ÿ“ˆTime Series
Flag this post
Is your business prepared for these growing phishing scams?
techradar.comยท1d
๐ŸŽฏThreat Hunting
Flag this post
Hacker Paragraph: BSI Chief Calls for Decriminalization of Security Researchers
heise.deยท1d
๐Ÿ”“Hacking
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Flag this post
Natural Building Blocks for Structured World Models: Theory, Evidence, and Scaling
arxiv.orgยท15h
๐Ÿ”ฒCellular Automata
Flag this post