eBPF Rootkit
synacktiv.comยท12hยท
Discuss: Hacker News
๐ŸฆญPodman
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.toยท15hยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Olmo 3 is a fully open LLM
simonwillison.netยท5h
๐Ÿฆ™Ollama
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movยท8hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
fastercapital.comยท9hยท
Discuss: Hacker News
๐Ÿ’ธAffordable LLMs
Flag this post
The Censorship Network: Regulation and Repression in Germany Today
liber-net.orgยท9hยท
Discuss: Hacker News
๐Ÿ’ฌWebmentions
Flag this post
Manual jailbreak chaining is not dead, it just requires context accumulation. Here is the protocol I used on Qwen-3 and Gemini 2.5.
neuralnoodle.substack.comยท2dยท
Discuss: r/LocalLLaMA
๐Ÿ’กObservability on a Budget
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.comยท11hยท
Discuss: Hacker News
๐Ÿ“ฆDependency Confusion
Flag this post
Minimal CLI web security scanner
github.comยท15hยท
Discuss: Hacker News
๐Ÿ›ก๏ธContent Security Policy
Flag this post
Contributing to opensource
wayland.freedesktop.orgยท1dยท
Discuss: r/opensource
๐ŸŒOpen Source
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.aiยท7hยท
Discuss: Hacker News
๐Ÿ“Linked-Note-Taking Tools
Flag this post
Cryptology Group Held an Election, but Canโ€™t Decrypt the Results
nytimes.comยท1dยท
๐ŸŽญPrivacy Engineering
Flag this post
Weekly Update 479
troyhunt.comยท1h
๐Ÿ’กObservability on a Budget
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
nocomplexity.substack.comยท17hยท
Discuss: Substack
๐Ÿ“ฆDependency Confusion
Flag this post
Beyond the Changelog: Engineering Your Blog for B2B Thought Leadership
getmichaelai.comยท17hยท
Discuss: DEV
๐Ÿ”๏ธAlpine.js
Flag this post
FCC rolls back cybersecurity rules for telcos despite state hacking risks
bleepingcomputer.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Security
Flag this post
The Limits of Formal Security Models โ€“ Dorothy E. Denning (1999)
faculty.nps.eduยท3dยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Security
Flag this post
HugBunter Deleted: Reddit Erases Dread Forum Administrator
sambent.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Caddy
Flag this post
How X national origin label is not a magic 8-ball at all
justapedia.orgยท16hยท
Discuss: Hacker News
๐ŸฆŠInformation Foraging Theory
Flag this post
Show HN: Hirosend โ€“ Simple Encrypted File Sharing
hirosend.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆPersonal Archiving
Flag this post