mjpawlowski's Top FindsLoading...
Half of the World’s Satellites Are Leaking Unencrypted Data From Phones, Planes, and Even the Military
zmescience.com·1d
🛡Cybersecurity
Flag this post
My Home (VPN) Network Setup
a14m.dev·10h·
Discuss: Hacker News
Flag this post
The Road to Vostok demo showcases a promising foundation for a hardcore, single-player survival expe
shacknews.com·4h
Flag this post
Just My Type
hackster.io·6h
Flag this post
Making .NET Serialization Gadgets by Hand
vulncheck.com·1d·
Discuss: Hacker News
Flag this post
Debian Contributions: Upstreaming cPython patches, ansible-core autopkgtest robustness and more! (by Anupa Ann Joseph)
freexian.com·1d
Flag this post
🎲 Weeknotes 2025 W45: Polymorphic
denisdefreyne.com·3d
🦀Rust
Flag this post
How to limit TCP/IP RAM usage on STM32 microcontrollers
edn.com·20h
Flag this post
The built-in storytelling of Rust
daverupert.com·1d
🦀Rust
Flag this post
Tableplot Tutorial: Customizing Plots with Parameter Substitution
clojurecivitas.github.io·3d
🦀Rust
Flag this post
Telegram sues Australia over age verification law − here's what we know
techradar.com·16h
🛡Cybersecurity
Flag this post
Working on a kubernetes and gitops
reddit.com·11h·
Discuss: r/devops
Flag this post
Interactive Service For Choosing a Jurisdiction For Crypto Businesses And Startups
hackernoon.com·7h
Flag this post
Bluetooth Security Risks: Why Leaving It On Could Endanger Your Data
blogger.com·1d
🛡Cybersecurity
Flag this post
After 30ish years of starts and stops I finally released a "computer game" in a rather unexpected way.
reddit.com·2d·
Discuss: r/gamedev
Flag this post
Kaspersky Brings Its Antivirus Software to Linux Desktops (For a Fee)
omgubuntu.co.uk·1d
Flag this post
Day 33: Python Sort by Vowels, Custom Sorting Fruits by Vowel Count with Keys
dev.to·19h·
Discuss: DEV
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·11h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·11h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·11h
🛡Cybersecurity
Flag this post