Natalie ArellanoinBuildpacksAnnouncing findings from security auditThe CNB project is proud to have recently completed a security review, working with Quarkslab and the Open Source Technology Improvement…7h ago
The Useful TechinMac O’ClockWhy Apple’s Private Cloud Is The Best AI Implementation YetApple’s Is Going To Permanently Change Our Perception About AIJun 307
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.May 1245May 1245
CICADA8Process Injection is Dead. Long Live IHxHelpPaneServerProcess Injection without Process Injection. Exploring cross-session activation mechanisms to steal someone else’s session using COM2d ago2d ago
Mike HearningraalvmWriting Truly Memory Safe JIT CompilersHow to kill off a top source of browser exploitsJun 63Jun 63
Natalie ArellanoinBuildpacksAnnouncing findings from security auditThe CNB project is proud to have recently completed a security review, working with Quarkslab and the Open Source Technology Improvement…7h ago
The Useful TechinMac O’ClockWhy Apple’s Private Cloud Is The Best AI Implementation YetApple’s Is Going To Permanently Change Our Perception About AIJun 307
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.May 1245
CICADA8Process Injection is Dead. Long Live IHxHelpPaneServerProcess Injection without Process Injection. Exploring cross-session activation mechanisms to steal someone else’s session using COM2d ago
Mike HearningraalvmWriting Truly Memory Safe JIT CompilersHow to kill off a top source of browser exploitsJun 63
Cassie KozyrkovAI security and a16z: Crawling with badnessMajor security issues revealed in audit of a16z reference LLM architectureJul 94
Radu ZahariaOn phones, security, and the modern DNSI always wanted to have my own DNS server. Not for every possible Internet query, but just for the ones I want. I like to avoid using IPs…May 276