3
3
Ansible Release 12: The Windows Vista Moment (ipspace.net)
57
The cryptography behind electronic passports (trailofbits.com)
60
Keeping the Internet fast and secure: introducing Merkle Tree Certificates (cloudflare.com)
6
GM Will Phase Out Apple CarPlay and Android Auto on Its Gas-Fed Cars (caranddriver.com)
3
Azure Portal Outage (status.microsoft)
1
Surreptitious Surveillance (cr.yp.to)
55
Geolocation and Starlink (potaroo.net)
1
Against the Protection of Stocking Frames (ethanmarcotte.com)
4
Subverting code integrity checks to locally backdoor Signal, 1Password, Slack (trailofbits.com)
118
Weaponizing image scaling against production AI systems (trailofbits.com)
45
Cross-Site Request Forgery (filippo.io)
2
Windows SPNEGO Nightmare: Critical RCE Vulnerability (zeropath.com)
1
SVG Optimization and Accessibility Basics (dbushell.com)
2
Meta AI model can reproduce almost half of Harry Potter book (arstechnica.com)
1
Apple Created a Custom iPhone Camera for F1 (wired.com)
4
Bootstrapping HTTP/1.1, HTTP/2, and HTTP/3 (netmeister.org)
90
The cryptography behind passkeys (trailofbits.com)
17
Microsoft's new "passwordless by default" is great but comes at a cost (arstechnica.com)
3
NSA warns "fast flux" threatens national security (arstechnica.com)
1
Enhancing CA Practices: Key Updates in Mozilla Root Store Policy, v3.0 (blog.mozilla.org)
1
WayFi Wireless Provides Seamless Cellular Coverage via Wi-Fi Passpoint (packetpushers.net)
2
Ask HN: Chicago area Amber Alert system gone haywire?
2
Best Practices for Key Derivation (trailofbits.com)
3
Who Controls the Internet? And should they? (2021) (berthub.eu)
1
Fabulous Font-Face Fallbacks (perfplanet.com)
5
Making AWS News stupid fast with smart caching (lucvandonkersgoed.com)
5
Unkillable UEFI bootkit for Linux in the wild (arstechnica.com)
2
New SMB-friendly subscription tier may be too late to stop VMware migrations (arstechnica.com)
10
Ethernet at NANOG 92 (potaroo.net)
2
Matt's Malware (dbushell.com)
1
Björn Ottosson, Creator of the Oklab Color Space (smashingmagazine.com)
2
Notes on AWS Nitro Enclaves: Attack Surface (trailofbits.com)
6
Dumb Home (dbushell.com)
14
Yubikeys are vulnerable to cloning attacks thanks to side channel (arstechnica.com)
3
The Deno Package Paradox (dbushell.com)
2
AES-GEM (AES with Galois Extended Mode) (trailofbits.com)
23
Reconstructing Public Keys from Signatures (keymaterial.net)
1
Understanding Apple's On-Device and Server Foundation Models Release (trailofbits.com)
1
Reasons to strive for better disclosure processes (trailofbits.com)
1
Adopting the CWE Standard for Microsoft CVEs (microsoft.com)
13
Let's Kerberos (imperialviolet.org)
52
Google Public DNS's approach to fight against cache poisoning attacks (googleblog.com)
82
About the Tailscale.com outage on March 7, 2024 (tailscale.com)
1
A Trail of Flipping Bits (trailofbits.com)
1
AMS-IX Outage: Layer-2 Strikes Again (ipspace.net)
1
To Schnorr and beyond (part 2) (cryptographyengineering.com)
2
Researchers bypass the fingerprint readers in most Windows PCs (arstechnica.com)
2
Gmail client-side encryption: A deep dive (googleblog.com)
1
Potential Risk of Privilege Escalation in Azure Ad Applications (microsoft.com)
13
Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks (microsoft.com)
2