eBPF Rootkit
π‘οΈeBPF Security
Flag this post
WebAssembly Still Expanding Frontend Uses 10 Years Later
thenewstack.ioΒ·13h
πΈοΈWebAssembly
Flag this post
The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems
aws.amazon.comΒ·1d
πCapability Systems
Flag this post
A WebAssembly Interpreter
πWASI
Flag this post
Olmo 3 is a fully open LLM
simonwillison.netΒ·5h
πBrotli Internals
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.orgΒ·2d
πΊFormat Archaeology
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
πDependency Resolution
Flag this post
Process Archetypes: The Roles in the Gnome Village
happihacking.comΒ·2d
πBash Monads
Flag this post
Architecting Uncertainty: Designing Reliable Systems on Top of LLMs
π§©WASM Components
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal βBulletproofβ Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.comΒ·1d
π€EBCDIC Privacy
Flag this post
No Deus ex Machina
π©Systems Programming
Flag this post
The Limits of Formal Security Models β Dorothy E. Denning (1999)
πCryptographic Archaeology
Flag this post
Show HN: GuardiAgent β Sandboxing / permission model for MCP servers
π‘οΈCLI Security
Flag this post
Dingo: A Meta-Language for Go
π¦Rust Macros
Flag this post
The Loss of Control Playbook: Degrees, Dynamics, and Preparedness
arxiv.orgΒ·2d
π²Cellular Automata
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
πOperating system internals
Flag this post
OWASP Top 10 tackles supply chain risk
reversinglabs.comΒ·2d
πCapability Systems
Flag this post
AI Agent Security: Why Reliability Is the Missing Defense Against Data
π‘οΈError Boundaries
Flag this post
Mad drunk on the mead of poetry
blog.zarfhome.comΒ·1d
π§ͺCBOR Fuzzing
Flag this post
Loading...Loading more...