New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.netยท4hยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Reflections on Trusting Trust (1984)
web.archive.orgยท11hยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.comยท2d
๐Ÿ”Post-Quantum Cryptography
Flag this post
Best Digital Marketing Institute in Allahabad โ€“ Ndmit Prayagraj
ndmit.comยท21hยท
Discuss: Hacker News
๐Ÿ”„Data Engineering
Flag this post
Developer salaries may increase with AI
mtyurt.netยท13hยท
Discuss: Hacker News
โš™๏ธAI Infrastructure
Flag this post
ISC2 Security Congress: The shaky state of AI security today
scworld.comยท11hยท
Discuss: Hacker News
โš™๏ธAI Infrastructure
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท3d
๐Ÿ”Post-Quantum Cryptography
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comยท2dยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
LLM AuthZ Handbook: A Practical Guide for AI Builders and Users
flatt.techยท3dยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.comยท1dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservability
Flag this post
Show HN: KeyLeak Detector โ€“ Scan websites for exposed API keys and secrets
github.comยท1dยท
Discuss: Hacker News
๐Ÿค–AI
Flag this post
Guide: TLS and QUIC
moq.devยท2dยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
The overengineered Solution to my Pigeon Problem
maxnagy.comยท2hยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Smaller Surfaces
nrempel.comยท1dยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWASM
Flag this post
Mitre ATT&CK v18 released
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservability
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.orgยท12hยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.comยท14hยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Adaptive Twisting Metamaterials
advanced.onlinelibrary.wiley.comยท7hยท
Discuss: Hacker News
๐Ÿ’ปProgramming
Flag this post
Becoming the Internet: Weighing the Options
blog.bsprague.comยท1dยท
Discuss: Hacker News
๐Ÿช™cryptocurrency
Flag this post