New script: AWS China MFA login
perrotta.devยท1d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap
circleid.comยท2d
๐ŸŒDNS Security
god shut up about AI, part 32 — open etiquette
oblomovka.comยท1dยท
๐ŸŽ™๏ธWhisper
EagleFiler 1.9.19
c-command.comยท2d
๐ŸŽApple Archive
From Data to Reports โ€“ Instantly with AI
speedylytics.comยท1dยท
Discuss: Hacker News
๐Ÿ“ŠCount-Min Sketch
Signal Braces For Quantum Age With SPQR Encryption Upgrade
it.slashdot.orgยท1d
๐Ÿ”Quantum Security
Statefiles Are a Crime Scene
systeminit.comยท3dยท
Discuss: Hacker News
โœ…Archive Fixity
The 3-2-1 Backup Strategy
backblaze.comยท3dยท
Discuss: Hacker News
๐Ÿ’ฟBackup Strategies
Chartifact โ€“ Declarative, interactive data documents
microsoft.github.ioยท2dยท
Discuss: Hacker News
๐Ÿ“‹Document Grammar
Why Data Is the New Gold
estimateproperty.blogspot.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Supply Chain Risks in Late 2025
buttondown.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Supply Chain
Custom RSS Feeds
alastairrushworth.substack.comยท3dยท
Discuss: Substack
๐Ÿ“ฐRSS Feed Discovery
When Nova introduced hacking to the mainstream
dfarq.homeip.netยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.comยท3d
๐ŸŒณArchive Merkle Trees
Devvortex
infosecwriteups.comยท1d
๐Ÿš€Indie Hacking
Design engineering 101: Typeahead like Spotlight and Omnibox
blog.florianschulz.infoยท7hยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Typography
Show HN: TorchSystem, Event driven systems with PyTorch
github.comยท1dยท
Discuss: Hacker News
โšกIncremental Computation
Data Quality Taxonomy for Data Monetization
arxiv.orgยท3d
๐Ÿ”—Data Provenance
OpenAI's GPT-OSS-20B Model and Safety Alignment Issues in a Low-Resource Language
arxiv.orgยท2d
๐ŸŒProtocol Synthesis
Zero-shot reasoning for simulating scholarly peer-review
arxiv.orgยท2d
๐Ÿ”Vector Forensics