Top
New
π¦
based2
joined
7/3/11, 9:21 PM
has
17925
karma
Posts
Kyo: Toolkit for Scala Development
by
based2
on 5/3/25, 7:18 PM
with
0
comments
Scalar Conference 2025 β Summary and Highlights
by
based2
on 5/3/25, 7:11 PM
with
0
comments
RFK Jr. & HHS: Last Week Tonight with John Oliver (HBO) [video]
by
based2
on 5/3/25, 5:40 PM
with
0
comments
Apache Airflow 3 is Generally Available
by
based2
on 5/3/25, 3:55 PM
with
0
comments
OpenDesk Architecture
by
based2
on 5/3/25, 3:52 PM
with
0
comments
Changes to Microsoft Authenticator Autofill
by
based2
on 5/3/25, 3:02 PM
with
3
comments
Cybersecurity (Anti)Patterns: Busywork Generators
by
based2
on 5/3/25, 2:56 PM
with
1
comments
OpenStack at the April 2025 PTG: All Things 'Epoxy' & 'Flamingo'
by
based2
on 4/25/25, 8:42 PM
with
0
comments
What is encrypted SNI? β How ESNI works
by
based2
on 4/21/25, 2:09 PM
with
0
comments
Can You Run the Llama 2 LLM on DOS?
by
based2
on 4/21/25, 1:41 PM
with
1
comments
Wazuh: Open-Source Security Platform. Unified XDR and SIEM Protection for Endpoi
by
based2
on 4/21/25, 1:25 PM
with
0
comments
ReVision Party 2ΓΈ25
by
based2
on 4/21/25, 12:13 PM
with
1
comments
Snappy: Fast Compressor/Decompressor
by
based2
on 4/21/25, 12:06 PM
with
0
comments
Enlightenment desktop: Terminology 1.14.0 Release
by
based2
on 4/21/25, 11:29 AM
with
2
comments
Finance worker pays out $25M after video call with deepfake 'chief financ (2024)
by
based2
on 3/16/25, 10:01 PM
with
2
comments
Get Answers from EU Institutions
by
based2
on 12/29/24, 9:23 PM
with
0
comments
38c3: Automated Malfare β discriminatory effects of welfare automation
by
based2
on 12/29/24, 8:45 PM
with
0
comments
38c3: Self Models of Loving Grace by Joshua Bach
by
based2
on 12/29/24, 11:02 AM
with
0
comments
Researchers crack Microsoft Azure MFA
by
based2
on 12/13/24, 9:20 PM
with
0
comments
Exploring the Potential of Stonebraker's New DBOS
by
based2
on 11/24/24, 3:25 PM
with
0
comments
Perfecting Ransomware on AWS β Using keys to the kingdom to change the locks
by
based2
on 10/12/24, 3:20 PM
with
1
comments
Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Snipe
by
based2
on 10/12/24, 3:17 PM
with
0
comments
Securing our future: September 2024 progress update on Microsoft's Secure Future
by
based2
on 10/12/24, 2:55 PM
with
0
comments
Critical flaw in Nvidia Container Toolkit allows full host takeover
by
based2
on 9/29/24, 9:38 PM
with
0
comments
The Treasures of Crash Reports
by
based2
on 9/29/24, 1:44 PM
with
0
comments
Enisa Threat Landscape 2024
by
based2
on 9/28/24, 11:45 AM
with
0
comments
CVE-2024-6104 go-retryablehttp
by
based2
on 9/28/24, 11:02 AM
with
0
comments
Forward Secrecy
by
based2
on 9/28/24, 10:58 AM
with
0
comments
CosmicBeetle joins the ranks of RansomHub affiliates
by
based2
on 9/28/24, 10:47 AM
with
0
comments
Disgomoji Malware Used to Target Indian Government
by
based2
on 9/28/24, 10:33 AM
with
0
comments
Hyundai Faces New Theft Threat from "Game Boy" Hack
by
based2
on 9/28/24, 9:56 AM
with
22
comments
Insecurity Through Censorship: Vulnerabilities Caused by the Great Firewall
by
based2
on 9/28/24, 9:36 AM
with
1
comments