Weighted Quantile Weirdness and Bugs
practicalsignificance.comยท9hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Charting the future of AI, from safer answers to faster thinking
news.mit.eduยท10h
๐Ÿ—ƒ๏ธZettelkasten
Flag this post
Marden's Theorem
en.wikipedia.orgยท18hยท
Discuss: Hacker News
โ™Ÿ๏ธGame Theory
Flag this post
AxCrypt 3.0.0.37
majorgeeks.comยท2d
๐Ÿ’ŽEthereum
Flag this post
Proof of the Riemann Hypothesis. - Phaztwรธ
i.redd.itยท17hยท
Discuss: r/compsci
๐Ÿ’ŽEthereum
Flag this post
The Anatomy of a Data Breach: From Stolen Details to Stolen Identities
cyberthreatalliance.orgยท11h
๐Ÿ›ก๏ธCybersecurity
Flag this post
Switching from GPG to Age
luke.hsiao.devยท1dยท
Discuss: Hacker News
๐ŸงLinux
Flag this post
Building My First Home Lab & Network Setup โ€” Old House, Endless Cabling Chaos
reddit.comยท1hยท
Discuss: r/homelab
๐ŸงLinux
Flag this post
Credentials Evidence or Simulate
preludes.euยท3dยท
Discuss: Hacker News
๐Ÿ›ก๏ธCybersecurity
Flag this post
Show HN: Kumi โ€“ a portable, declarative, functional core for business logic
kumi-play-web.fly.devยท1dยท
Discuss: Hacker News
๐Ÿ’ŽEthereum
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Future Cryptanalytic Attacks
dev.toยท22hยท
Discuss: DEV
โ›“๏ธBlockchain
Flag this post
Programming Languages Lie: Variables Arenโ€™t What You Think They Are
dev.toยท1dยท
Discuss: DEV
โŒจKeyboards
Flag this post
Application of Blockchain Frameworks for Decentralized Identity and Access Management of IoT Devices
arxiv.orgยท3d
โ›“๏ธBlockchain
Flag this post
CISO Predictions for 2026
fortinet.comยท2d
๐Ÿ›ก๏ธCybersecurity
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.orgยท3d
๐Ÿ›ก๏ธCybersecurity
Flag this post
Top 5 Strategies for Ensuring Security in Cloud Migrations
dev.toยท58mยท
Discuss: DEV
๐Ÿ›ก๏ธCybersecurity
Flag this post
Update: Added JWT detection + policy config to my open-source secrets scanner due to feedback
reddit.comยท7hยท
Discuss: r/selfhosted
๐Ÿ’ปCLI Tools
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.orgยท1d
๐Ÿ›ก๏ธCybersecurity
Flag this post
Breaking and Fixing MacaKey
eprint.iacr.orgยท3d
โ›“๏ธBlockchain
Flag this post