Unreliable library of human knowledge
flowingdata.comยท3d
๐Ÿ“ฐContent Curation
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท2d
๐Ÿ”“Hacking
Like, Share and Subscribe
kevquirk.comยท2h
๐Ÿ“กRSS Readers
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท4d
๐Ÿ“บVT100
How I provide technical clarity to non-technical leaders
seangoedecke.comยท14h
โš™๏ธProof Engineering
Never Ever Use Content Addressable Storage
frederic.vanderessen.comยท4dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
Weeknotes #345 โ€” Bath full of bricks
andrewdoran.ukยท3d
๐ŸŽฏContent Recommendation
LineageOS 23
lineageos.orgยท14hยท
๐Ÿ”“Open Source Software
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.comยท3d
๐Ÿ–ผ๏ธJPEG XL
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท2dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
AI models can acquire backdoors from surprisingly few malicious documents
arstechnica.comยท2d
๐Ÿ”“Hacking
Show HN: Connectcap โ€“ diagnostic CONNECT proxy that records traffic with libpcap
github.comยท3dยท
Discuss: Hacker News
๐Ÿ“ŠPCAP Analysis
Cybercrime ring GXC Team dismantled in Spain, 25-year-old leader detained
securityaffairs.comยท20h
๐Ÿ”“Hacking
I was tired of regression testing, so I weekend-vibe-coded something
dev.toยท2hยท
Discuss: DEV
โ„๏ธNix Flakes
Day 29 of python code series..
dev.toยท3hยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
CVE-2025-11371: Unpatched zero-day in Gladinet CentreStack, Triofox under attack
securityaffairs.comยท18h
๐Ÿ”“Hacking
Memgoose โ€“ An In-Memory Mongoose Impersonator
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Immersive Historical Reconstruction Validation via Multi-Sensor VR Data Fusion & Causal Inference
dev.toยท15hยท
Discuss: DEV
๐ŸบComputational Archaeology
Exposing Citation Vulnerabilities in Generative Engines
arxiv.orgยท3d
๐Ÿ“œDigital Philology