We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·2d·
Discuss: Hacker News
🛡️macOS Security
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.com·13h·
Discuss: Hacker News
🔄Reproducible Builds
Flag this post
From Lossy to Lossless Reasoning
manidoraisamy.com·11h·
Discuss: Hacker News
🧩Parser Combinators
Flag this post
Security Doesn’t Have to Hurt
docker.com·16h
🛡️macOS Security
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.org·2d·
Discuss: Hacker News
📵Digital Minimalism
Flag this post
MCP Security: Navigating the Exploit Playbook for Agent
dev.to·5h·
Discuss: DEV
🛡️macOS Security
Flag this post
Neither Consent nor Property: A Policy Lab for Data Law
arxiv.org·1d
🖥️Self-hosted Infrastructure
Flag this post
Three Stages of Enlightenment
essenceofsoftware.com·1d·
Discuss: Hacker News
📵Digital Minimalism
Flag this post
Why Automating GDPR Compliance Is Essential for Modern Businesses
dev.to·1d·
Discuss: DEV
🧠Automated Reasoning
Flag this post
Hardware to Prove Humanity
juliver.bearblog.dev·1d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·11h·
Discuss: Hacker News
⚙️Operating System Design
Flag this post
AI Prompts That Create Human Connection
lightcapai.medium.com·16h·
Discuss: Hacker News
🔤Language Design
Flag this post
Schema changes are a people problem, not a tooling problem
motherduck.com·1d·
Discuss: Hacker News
🔧DevOps
Flag this post
Using the expand and contract pattern for schema changes
prisma.io·9h·
Discuss: Hacker News
🔢Algebraic Data Types
Flag this post
Fragmented medical records delayed treatment for months
news.ycombinator.com·2h·
Discuss: Hacker News
🩹Self-Healing Systems
Flag this post
Social media feeds 'misaligned' when viewed through AI safety framework
foommagazine.org·13h·
Discuss: Hacker News
🌐ActivityPub
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.to·1d·
Discuss: DEV
Existential Types
Flag this post
EY 4TB Data Leak
neosecurity.nl·1d·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
Web PKI Ditches TLS Client Authentication
feistyduck.com·1d·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·9h·
Discuss: Hacker News
Automated Theorem Proving
Flag this post