Show HN: Computational Metaphysics: Zeroth Implementation of Grover's and Shor's
🔤typography
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.com·1d
🔤typography
Flag this post
🆓 Will Glow the Wisp is free to keep on Steam https://store.steampowered.com/app/640890/?curator_clanid=4777282&utm_source=SteamDB
🔤typography
Flag this post
Thoughts on bug bounty programs
blog.birbpara.de·12h
🌐Open Source
Flag this post
Working on a digital vault, looking for advice or examples (zero-knowledge, cryptography, encryption)
🌐Open Source
Flag this post
Foreign hackers breach U.S. Congressional Budget Office - WaPo
nordot.app·2d
📊Data Visualization
Flag this post
Have I Been Pwned: Billions of New Passwords in Collection
heise.de·2d
📊Data Visualization
Flag this post
APPLE-SA-11-03-2025-9 Xcode 26.1
seclists.org·1d
🌐Open Source
Flag this post
Tracking Down Progressively-Enhanceable APIs
willhbr.net·1d
🔤typography
Flag this post
I want you to understand Chicago
🔤typography
Flag this post
Vibing Negative
theblackwall.uk·2d
🔤typography
Flag this post
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
thehackernews.com·1d
🌐Open Source
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nz·15h
🔤typography
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·1d
⚖law
Flag this post
Loading...Loading more...