overflow@lemmy.ml to Privacy@lemmy.ml · 5 months agoHacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Copsplus-squarewww.404media.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Copsplus-squarewww.404media.cooverflow@lemmy.ml to Privacy@lemmy.ml · 5 months agomessage-square0fedilink
overflow@lemmy.ml to Privacy@lemmy.ml · 5 months agoHow secure is Secure Erase (EACAS)?plus-squareeclecticlight.coexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow secure is Secure Erase (EACAS)?plus-squareeclecticlight.cooverflow@lemmy.ml to Privacy@lemmy.ml · 5 months agomessage-square0fedilink
overflow@lemmy.ml to Security@lemmy.ml · 8 months agoSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSIM swappers hijacking phone numbers in eSIM attacksplus-squarewww.bleepingcomputer.comoverflow@lemmy.ml to Security@lemmy.ml · 8 months agomessage-square0fedilink
overflow@lemmy.ml to Programming@programming.dev · 8 months agoEight years of organizing tech meetups | notes.eatonphil.complus-squarenotes.eatonphil.comexternal-linkmessage-square1fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1external-linkEight years of organizing tech meetups | notes.eatonphil.complus-squarenotes.eatonphil.comoverflow@lemmy.ml to Programming@programming.dev · 8 months agomessage-square1fedilink
overflow@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agoRead the Roonplus-squareopen.substack.comexternal-linkmessage-square1fedilinkarrow-up17arrow-down153
arrow-up1-46arrow-down1external-linkRead the Roonplus-squareopen.substack.comoverflow@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agomessage-square1fedilink
overflow@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agoChinaTalk - India's Chip Warplus-squarepodcasts.google.comexternal-linkmessage-square2fedilinkarrow-up118arrow-down15
arrow-up113arrow-down1external-linkChinaTalk - India's Chip Warplus-squarepodcasts.google.comoverflow@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agomessage-square2fedilink
overflow@lemmy.ml to General Programming Discussion@lemmy.ml · 9 months agoThe Death of Voice Has Been Greatly Exaggeratedplus-squareblog.telegeography.comexternal-linkmessage-square1fedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkThe Death of Voice Has Been Greatly Exaggeratedplus-squareblog.telegeography.comoverflow@lemmy.ml to General Programming Discussion@lemmy.ml · 9 months agomessage-square1fedilink
overflow@lemmy.ml to Linux@lemmy.ml · 9 months agoThe Berkeley Software Distributionplus-squarewww.abortretry.failexternal-linkmessage-square2fedilinkarrow-up180arrow-down13
arrow-up177arrow-down1external-linkThe Berkeley Software Distributionplus-squarewww.abortretry.failoverflow@lemmy.ml to Linux@lemmy.ml · 9 months agomessage-square2fedilink
overflow@lemmy.ml to Linux@lemmy.ml · 9 months agoThe History of Debian, Part 1plus-squarewww.abortretry.failexternal-linkmessage-square6fedilinkarrow-up166arrow-down112
arrow-up154arrow-down1external-linkThe History of Debian, Part 1plus-squarewww.abortretry.failoverflow@lemmy.ml to Linux@lemmy.ml · 9 months agomessage-square6fedilink
overflow@lemmy.ml to Emulation@lemmy.ml · 10 months agoYou can FINALLY emulate an iPod Touch on your PC!plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkYou can FINALLY emulate an iPod Touch on your PC!plus-squareyoutu.beoverflow@lemmy.ml to Emulation@lemmy.ml · 10 months agomessage-square0fedilink
overflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agoGrokking Huffman Codingplus-squareopen.substack.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkGrokking Huffman Codingplus-squareopen.substack.comoverflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Write a Secure JWT Library If You Absolutely Mustplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agoThe Programming Languages Zooplus-squareplzoo.andrej.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThe Programming Languages Zooplus-squareplzoo.andrej.comoverflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agoInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInnovations in the AWS Database Encryption SDKplus-squarescottarc.blogoverflow@lemmy.ml to Cryptography@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agoWhat every IT person needs to know about OpenBSDplus-squarebsdly.blogspot.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkWhat every IT person needs to know about OpenBSDplus-squarebsdly.blogspot.comoverflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to General Programming Discussion@lemmy.ml · edit-21 year agogrokking neural networksplus-squarephotonlines.substack.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkgrokking neural networksplus-squarephotonlines.substack.comoverflow@lemmy.ml to General Programming Discussion@lemmy.ml · edit-21 year agomessage-square0fedilink
overflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agoFacebook PHP Source Code from August 2007plus-squaregist.github.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFacebook PHP Source Code from August 2007plus-squaregist.github.comoverflow@lemmy.ml to General Programming Discussion@lemmy.ml · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year ago17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.bevideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1video17: Visualizing and Decrypting TLS 1.3 | Learn Wireshark @ SF22USplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.bevideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1videoPasskeys: The Good, the Bad and the Uglyplus-squareyewtu.beoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink
overflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agoOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOn Ashton Kutcher and Secure Multi-Party Computationplus-squareblog.cryptographyengineering.comoverflow@lemmy.ml to Cryptography@lemmy.mlEnglish · 1 year agomessage-square0fedilink