Encryption, Secure Communications, Zero Knowledge Proofs, Cryptographic Primitives

Your Network, Your Rules: Why DDoS Protection Finally Works on Your Terms
corero.com·1d
🏗️Resilient Infrastructure
Flag this post
OpenAI’s Sora 2 Floods Social Media With Videos of Women Being Strangled
404media.co·1h
💻Hacking Games Puzzles Programming Skills Competition
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·2d·
🧩WASM
Flag this post
Cybercrims plant destructive time bomb malware in industrial .NET extensions
theregister.com·1h
💻Hacking Games Puzzles Programming Skills Competition
Flag this post
What data do coding agents send, and where to?
chasersystems.com·3d·
Discuss: Hacker News
💻Hacking Games Puzzles Programming Skills Competition
Flag this post
Show HN: XML-Lib – An over-engineered XML workflow with guardrails and proofs
github.com·1h·
Discuss: Hacker News
🧩WASM
Flag this post
Noise Injection: Improving Out-of-Distribution Generalization for Limited Size Datasets
arxiv.org·11h
🧮Algorithmic Puzzles
Flag this post
Beyond Citations: Measuring Idea-level Knowledge Diffusion from Research to Journalism and Policy-making
arxiv.org·1d
🧩WASM
Flag this post
Photonic implementation of quantum hidden subgroup database compression
arxiv.org·2d
🧮Algorithmic Puzzles
Flag this post
Non-relativistic Quantum Mechanics on a Twisted Cylindrical Surface
arxiv.org·11h
🧰Low Tech
Flag this post
Free Majorana Modes in Superconducting Quantum Wires
arxiv.org·1d
🔌Offline Computing
Flag this post
Transfer entropy and flow of information in two-skyrmion system
arxiv.org·2d
🔌Offline Computing
Flag this post
Show HN: Lakekeeper – a fast, lightweight Iceberg REST catalog in Rust
github.com·11h·
Discuss: Hacker News
🧩WASM
Flag this post