@anon
sign up
@anon
sign up
pull down to refresh
EUCLEAK Side-Channel Attack on the YubiKey 5 Series
ninjalab.io/eucleak/
149 sats
\
1 comment
\
@hn
3 Sep 2024
tech
related
Peano arithmetic is enough, because Peano arithmetic encodes computation
math.stackexchange.com/a/5075056/6708
10 sats
\
0 comments
\
@hn
14 Jun
tech
Making memcpy(NULL, NULL, 0) well-defined
developers.redhat.com/articles/2024/12/11/making-memcpynull-null-0-well-defined
25 sats
\
0 comments
\
@hn
11 Dec 2024
tech
Kimi K1.5: Scaling Reinforcement Learning with LLMs
github.com/MoonshotAI/Kimi-k1.5
14 sats
\
0 comments
\
@hn
21 Jan
tech
Escaping the Chrome Sandbox Through DevTools
ading.dev/blog/posts/chrome_sandbox_escape.html
109 sats
\
0 comments
\
@hn
17 Oct 2024
tech
OpenMPTCProuter: Aggregate and encrypt multiple internet connections using MPTCP
www.openmptcprouter.com/
11 sats
\
0 comments
\
@hn
23 Nov 2024
tech
Intel's $475M error: the silicon behind the Pentium division bug
www.righto.com/2024/12/this-die-photo-of-pentium-shows.html
29 sats
\
0 comments
\
@hn
28 Dec 2024
tech
Sunset Geometry (2016)
www.shapeoperator.com/2016/12/12/sunset-geometry/
24 sats
\
0 comments
\
@hn
15 Mar
tech
Nanolog supports logging with 7 ns median latency
github.com/PlatformLab/NanoLog
31 sats
\
0 comments
\
@hn
23 Aug 2024
tech
Preserving a floppy disk with a logic analyzer and a serial cable
www.chzsoft.de/site/hardware/preserving-a-floppy-disk-with-a-logic-analyzer/
42 sats
\
0 comments
\
@hn
6 Jul 2024
tech
Computing with Time: Microarchitectural Weird Machines
cacm.acm.org/research-highlights/computing-with-time-microarchitectural-weird-machines/
11 sats
\
0 comments
\
@hn
25 Nov 2024
tech
The TikTok Case Will Be Determined by What's Behind the Government's Black Lines
www.lawfaremedia.org/article/the-tiktok-case-will-be-determined-by-what-s-behind-the-government-s-black-lines
10 sats
\
0 comments
\
@hn
14 Aug 2024
tech
Understanding Memory Management, Part 2: C++ and RAII
educatedguesswork.org/posts/memory-management-2/
10 sats
\
0 comments
\
@hn
9 Mar
tech
Fonts for Complex Data
www.typography.com/blog/fonts-for-complex-data
21 sats
\
0 comments
\
@hn
13 Apr 2024
tech
From Pegasus to Predator – The evolution of commercial spyware on iOS [video]
media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios
11 sats
\
0 comments
\
@hn
30 Dec 2024
tech
Machine-Assisted Proof by Terence Tao [pdf]
www.ams.org/notices/202501/rnoti-p6.pdf
172 sats
\
0 comments
\
@hn
28 Dec 2024
tech
Show HN: I made a git rebase TUI editor
github.com/NyuB/ocli
117 sats
\
0 comments
\
@hn
14 Oct 2024
tech
Evidence of the use of silk by Bronze Age civilization
www.nature.com/articles/s41598-024-78687-7
59 sats
\
1 comment
\
@hn
2 Dec 2024
tech
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side
arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/
193 sats
\
1 comment
\
@Rsync25
3 Sep 2024
security
Hertzbleed: a New Family of Side Channel Attacks
www.hertzbleed.com/
292 sats
\
2 comments
\
@CypherPoet
15 Jun 2022
bitcoin
Sidechannel Attacks - How Every CPU on Earth was Comprimised (2018)
www.youtube.com/watch?v=YRohz9VO1YY
128 sats
\
0 comments
\
@nerd2ninja
24 Mar 2024
security
YubiKey vulnerability will let attackers clone the authentication device
www.engadget.com/cybersecurity/yubikey-vulnerability-will-let-attackers-clone-the-authentication-device-143049198.html
111 sats
\
0 comments
\
@ch0k1
6 Sep 2024
news
more