WebAssembly: Yes, but for What?
cacm.acm.org·15h
🕸️WASM Archives
Flag this post
Making asm.js/WebAssembly compilation more parallel in Firefox
bouvier.cc·11h
🏗️Compiler Archaeology
Flag this post
FreeBSD now builds reproducibly and without root privilege
freebsdfoundation.org·13h·
Discuss: Hacker News
🐡OpenBSD
Flag this post
Unlocking Scalability: A Deep Dive into the Model-View-Controller (MVC) Pattern
dev.to·5h·
Discuss: DEV
🌊Stream Processing
Flag this post
Crafted URLs can trick OpenAI Atlas into running dangerous commands
securityaffairs.com·16h
🛡️WASM Security
Flag this post
"use workflow": Understanding Directives
useworkflow.dev·10h·
Discuss: Hacker News
🐚Shell Monads
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.com·11h
🛡️eBPF Security
Flag this post
Reaper – Unified Application Security Testing with AI Support
darknet.org.uk·1d
🧪Protocol Fuzzing
Flag this post
The New Calculus of AI-based Coding
blog.joemag.dev·13h·
🔄Reproducible Builds
Flag this post
Python Program Obfuscation Tool
pixelstech.net·1d
💣Compression Security
Flag this post
Feedback on my IaC HomeCluster
github.com·11h·
Discuss: r/homelab
🏠HomeLab
Flag this post
The art and science of effective security storytelling
redcanary.com·17h
🔗Data Provenance
Flag this post
Building Better Software: Why Workflows Beat Code Every Time • Ben Smith & James Beswick • GOTO 2025
youtube.com·17h
🔄Reproducible Builds
Flag this post
Distroless Containers for Corporate Use: Nix Flakes vs. Fedora
blog.riemann.cc·1d·
❄️Nix Adoption
Flag this post
I Built the Same App 10 Times: Evaluating Frameworks for Mobile Performance
lorenstew.art·13h·
🎬WebCodecs
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.io·2h
🔓Password Cracking
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·1d
🎫Kerberos Exploitation
Flag this post
S1130 – IBM 1130 Emulator in C#
github.com·17h·
Discuss: Hacker News
🕸️WebAssembly
Flag this post