Weighted Quantile Weirdness and Bugs
๐ฆRust
Flag this post
Charting the future of AI, from safer answers to faster thinking
news.mit.eduยท10h
๐๏ธZettelkasten
Flag this post
Marden's Theorem
โ๏ธGame Theory
Flag this post
AxCrypt 3.0.0.37
majorgeeks.comยท2d
๐Ethereum
Flag this post
Proof of the Riemann Hypothesis. - Phaztwรธ
๐Ethereum
Flag this post
The Anatomy of a Data Breach: From Stolen Details to Stolen Identities
cyberthreatalliance.orgยท11h
๐ก๏ธCybersecurity
Flag this post
Switching from GPG to Age
๐งLinux
Flag this post
Credentials Evidence or Simulate
๐ก๏ธCybersecurity
Flag this post
Show HN: Kumi โ a portable, declarative, functional core for business logic
๐Ethereum
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Future Cryptanalytic Attacks
โ๏ธBlockchain
Flag this post
Application of Blockchain Frameworks for Decentralized Identity and Access Management of IoT Devices
arxiv.orgยท3d
โ๏ธBlockchain
Flag this post
CISO Predictions for 2026
fortinet.comยท2d
๐ก๏ธCybersecurity
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.orgยท3d
๐ก๏ธCybersecurity
Flag this post
Update: Added JWT detection + policy config to my open-source secrets scanner due to feedback
๐ปCLI Tools
Flag this post
Vision Foundation Models in Agriculture: Toward Domain-Specific Adaptation for Weed Herbicide Trials Assessment
arxiv.orgยท3h
๐๏ธZettelkasten
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.orgยท1d
๐ก๏ธCybersecurity
Flag this post
Breaking and Fixing MacaKey
eprint.iacr.orgยท3d
โ๏ธBlockchain
Flag this post
Loading...Loading more...