youbecks's Top FindsLoading...
FSF EU Notarization Complaint
mjtsai.com·14h
Flag this post
The evidence is now quite strong that 9/11 was an inside job, likely done by CIA, with some assistance from Israeli and Saudi intelligence.
threadreaderapp.com·5h
Flag this post
At the Root: An Anti-Racist Ethical Source License for Open Source Projects
attheroot.dev·2d·
Discuss: Hacker News
🦹cybercrime
Flag this post
The Endpoint Has Moved to the Browser – Security Tools Haven't
securityboulevard.com·1d·
Discuss: Hacker News
Flag this post
When Enforcing Copyright Starts Breaking the Internet's Plumbing
quad9.net·1d·
Discuss: Hacker News
Flag this post
GSoC Wrap Up - Adding Witness Generation to cargo-semver-checks
glitchlesscode.ca·4h·
Discuss: r/rust
Flag this post
UK's 'deregulatory' AI approach won't protect human rights
computerweekly.com·23h·
Discuss: Hacker News
Flag this post
Google Cloud releases comprehensive agentic AI framework guideline
ppc.land·15h·
Discuss: r/ppcland
Flag this post
Why people dont demand data privacy – even as governments and corporations collect more personal information ( Opinion )
dailycamera.com·1d
🦹cybercrime
Flag this post
Google Security Researchers ID AI-Powered Malware Used in Real World Cyberattack
axios.com·5d
💥Cyberattack
Flag this post
Here's the biggest news you missed this weekend
nbcnews.com·1d
🦹cybercrime
Flag this post
A Beginner's Guide to Debugging Your Smart Home Appliances
dev.to·1d·
Discuss: DEV
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Public Transport Under Epidemic Conditions: Nonlinear Trade-Offs Between Risk and Accessibility
arxiv.org·5h
Flag this post
Understanding the Digital Underworld That Puts Your Data at Risk
dev.to·5d·
Discuss: DEV
🦹cybercrime
Flag this post
Chatter: Modern C based Unicode Chat/BBS
reddit.com·22h·
Flag this post
Why Ransomware Attacks Keep Rising and What Makes Them Unstoppable
blogger.com·4d
🦹cybercrime
Flag this post
Cybersecurity Means Real Security, Not Back Doors
techrights.org·2d
🦹cybercrime
Flag this post
Account Takeover via IDOR: From UserID to Full Access
infosecwriteups.com·2d
💥Cyberattack
Flag this post
Teach Systems to Own Repetitive Work Without Losing Human Context
dev.to·2h·
Discuss: DEV
Flag this post
From Auth to Action: The Complete Guide to Secure & Scalable AI Agent Infrastructure (2026)
dev.to·23h·
Discuss: DEV
Flag this post