trending now
quality: all 6+ 8+
7
0
github.com · owlstuffing· 1 month ago · research · details · hn 53
9
0
aws
beyondtrust.com · kmcquade· 23 days ago · research · details · hn 7
2
0

Freeman argues that decision theory and resource-allocation frameworks are categorically different from deep learning and should not be dismissed by the 'Bitter Lesson' paradigm. He critiques the conflation of decision-theoretic methods with hand-crafted symbolic AI, noting that decision theory addresses 'what to do' under uncertainty, not pattern recognition.

gfrm.in · slygent· 28 days ago · 12 min · opinion · details · hn 20
4
0

A software engineer reflects on interview failures and argues that 'design a resilient database' is an unanswerable question without context, using experience from fintech to illustrate why database selection depends entirely on specific requirements: consistency models, query patterns, availability SLAs, and failure modes. The article maps major database systems (PostgreSQL, Cassandra, Redis, etc.) to appropriate use cases, emphasizing that eventual consistency violates financial compliance while relational ACID databases are non-negotiable for regulated systems.

nikogura.com · donutshop· 1 month ago · 10 min · opinion · details · hn 52
8
0
blog.hartwork.org · spyc· 23 days ago · news · details · hn 7
1
0

A philosophical essay arguing that modern wealth accumulation by the ultra-wealthy functions as an asymmetric game played on society itself, with market crashes serving as deliberate board-clearing strategies that concentrate power while devastating ordinary people.

chrbutler.com · speckx· 29 days ago · 7 min · opinion · details · hn 25
7
0
download.ssrn.com · droidjj· 17 days ago · research · details · hn 2
7
0
openguard.sh · everlier· 20 days ago · 70 min · research · details · hn 4
2
0

A geopolitical analysis arguing that North Korea's refusal to denuclearize was strategically justified, given the failures of the international order to protect non-nuclear states (Libya, Iraq, Ukraine) from military intervention and regime change. The article examines how the collapse of deterrence mechanisms incentivizes other states to pursue nuclear weapons as the only reliable security guarantee.

persuasion.community · stefan_· 1 month ago · 8 min · opinion · details · hn 29
this feed is available as an API
GET /api/v1/news/?min_rating=7&days=1
3
0

A critical information disclosure vulnerability in Lloyds, Halifax, and Bank of Scotland mobile apps exposed customers' transaction histories, including charges, payments, and sensitive data like National Insurance numbers to other unrelated users. The issue was quickly identified and resolved, but affected an unknown number of the group's 26 million customers and exposed financial details including salary information and direct debits.

bbc.co.uk · druml· 28 days ago · 8 min · news · details · hn 21
7
0
agupubs.onlinelibrary.wiley.com · Noaidi· 1 month ago · news · details · hn 59
9
0
bughunteryash2511.medium.com · ◦•●◉✿ ¥ຮ₰ ʜc ✿◉●•◦· 14 days ago · 8 min · research · details
7
0
7
0
blog.detectify.com · Detectify· 14 days ago · tool · details
1
0

This is a blog post about historical payphone culture, specifically referencing a 1984 Associated Press article about an Iowa payphone. It contains no security-related content, vulnerabilities, or techniques.

payphone-project.com · TigerUniversity· 1 month ago · 3 min · not-security · details · hn 29
7
0
apnews.com · 1vuio0pswjnm7· 17 days ago · 32 min · research · details · hn 2
5
0

A retrospective analysis of how token issuance restructured Blockstack's product development priorities, replacing developer-focused iteration with narrative-driven roadmaps and metrics divorced from actual user needs, illustrating systemic feedback loop failure in crypto infrastructure projects.

markmhendrickson.com · mhendric· 1 month ago · 19 min · opinion · details · hn 49
2
0
infosecwriteups.com · Ehtesham Ul Haq· 14 days ago · tutorial · details
8
0
blog.securelayer7.net · securelayer7· 14 days ago · research · details
1
0

Privacy policy and terms of service document for a browser-based game called 100 Jumps. Contains no security research, vulnerability information, or attack techniques.

100jumps.org · pompomsheep· 27 days ago · 2 min · non-security · details · hn 17
1
0

A developer open-sourced a Steam game written entirely in Lua with a custom homebrew engine called Carimbo. This is unrelated to security research, vulnerability disclosure, or bug bounty hunting.

github.com · delduca· 1 month ago · off-topic · details · hn 65
7
0
cybertamarin.medium.com · Cyber Tamarin· 14 days ago · 6 min · research · details
7
0
medium.com · infosec_us_team· 14 days ago · 8 min · research · details
7
0
infosecwriteups.com · medium· 14 days ago · 10 min · tutorial · details
7
0
infosecwriteups.com · Windasunny· 14 days ago · 4 min · research · details
7
0
infosecwriteups.com · infosecwriteups· 14 days ago · tutorial · details
1
0

This article discusses a resurgence in wired headphone sales and cultural shift away from Bluetooth, driven by superior sound quality, reliability, and broader anti-technology sentiment among consumers.

bbc.com · billybuckwheat· 29 days ago · 13 min · news · details · hn 23
page 111 of 910
news.rdintel.com · api · mcp · rdintel.com