A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·2d
🔄CRDT
Flag this post
You’re not using Windows 11’s Dev Drive properly unless you move these 3 folders
makeuseof.com·4h
🌐WebAssembly
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·5d
🎯Bitboards
Flag this post
Transforming a Shuttle XPC DS61 into a NAS: Is it Worth It or Better to Ignore It?
⚖️CAP Theorem
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
⚖️CAP Theorem
Flag this post
I Deleted the Wrong Files (Again) — So I Built a Safer Trash CLI for Linux
⚖️CAP Theorem
Flag this post
Writing a DOS Clone in 2019
🔄Tokio
Flag this post
CHERIoT 1.0 Released
🎯Bitboards
Flag this post
Limitations of a two-pass assembler
boston.conman.org·23h
🌐WebAssembly
Flag this post
Lazy Backup (2006)
⚖️CAP Theorem
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·2d
🔄CRDT
Flag this post
Image formats: Codecs and compression tools
developer.mozilla.org·2h
📡gRPC
Flag this post
Build your own GPG in Rust
📡gRPC
Flag this post
AMD Confirms RDSEED Security Flaw In Zen 5 CPUs & Details Mitigation Plan
hothardware.com·6h
🎯Bitboards
Flag this post
Signed URLs on ESP32
🕸️Service Mesh
Flag this post
FreeBuf早报 | 苹果修复iOS与iPadOS多个高危漏洞;Android AI反诈系统月均百亿次威胁
freebuf.com·16h
📡gRPC
Flag this post
How PowerShell Gallery simplifies supply chain attacks
reversinglabs.com·10h
🌐WebAssembly
Flag this post
Loading...Loading more...