Cryptography, Authentication, Authorization, Secure Protocols, Threat Modeling

Apple releases iOS and iPadOS 18.7.2 with lots of security updates
macworld.comΒ·12h
πŸ’»Operating Systems
Flag this post
The CHAT Act Won't Protect Kids, But it Might Break the Internet.
reason.comΒ·15h
πŸ”ŒAPI Design
Flag this post
Bayesian prediction of aerospace system mission reliability with hierarchical and multi-fidelity test data fusion
sciencedirect.comΒ·16h
πŸ”¬eBPF
Flag this post
How can we keep our society and economy cyber secure?
newstatesman.comΒ·1d
πŸ”¬eBPF
Flag this post
Zama Announces Strategic Acquisition of KKRT Labs to Scale Confidentiality On Public Blockchains
hackernoon.comΒ·14h
πŸ”¬eBPF
Flag this post
Enhanced Dielectric Performance of Aircraft HV Power Cables via Nanocomposite Crosslinking Optimization
dev.toΒ·15hΒ·
Discuss: DEV
🌐Networking
Flag this post
Show HN: JermCAD – A YAML-powered, vibe-coded, browser-based CAD software
github.comΒ·16hΒ·
Discuss: Hacker News
πŸ¦€Rust
Flag this post
Some thoughts on AI and coding
infoworld.comΒ·23h
☁️Cloud Computing
Flag this post
A 2032 Takeoff Story
lesswrong.comΒ·7h
☁️Cloud Computing
Flag this post
Smarter Safety with AI + Vision: A Tech Blog on Industrial Risk Monitoring
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”¬eBPF
Flag this post
Louvre Heist Fallout Reveals Museum’s Video Security Password Was β€˜Louvre’
vice.comΒ·12h
πŸ”¬eBPF
Flag this post
Introducing the Overview of the AWS European Sovereign Cloud whitepaper
aws.amazon.comΒ·7h
☁️Cloud Computing
Flag this post
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
thehackernews.comΒ·38m
πŸ”¬eBPF
Flag this post
List Decoding and New Bicycle Code Constructions for Quantum LDPC Codes
arxiv.orgΒ·3h
πŸ”¬eBPF
Flag this post
How OAuth, MCP, and the OpenAI Apps SDK, Power the Next Generation of Interactive AI Experiences (with Stytch & OpenAI)
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”ŒAPI Design
Flag this post
Introducing YasuiJS β€” A Modern, Minimal REST Framework for Any Runtime
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”ŒAPI Design
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.comΒ·1d
πŸ”¬eBPF
Flag this post
​​Learn what generative AI can do for your security operations center
microsoft.comΒ·1d
πŸ”¬eBPF
Flag this post
Automated Infrastructure as Code (IaC) Drift Detection and Remediation with Predictive Analytics
dev.toΒ·1hΒ·
Discuss: DEV
πŸ“ŠMonitoring
Flag this post