Active
Recent
Comments
Search
Login
Login
Stories with
tags
in the
field
categories
Tip: read stories across multiple categories with
/categories/foo,bar
91
Hertzbleed Attack
hardware
security
hertzbleed.com
via
untitaker
11 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
10
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys
cryptography
hardware
security
arstechnica.com
via
Caustic
12 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
10
16-bit RISC-V processor made with carbon nanotubes (2019)
hardware
arstechnica.com
via
animatronic
12 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
12
Lotus58
hardware
peppe.rs
via
technetium
12 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
1
Faster than Fast Fourier Transform (2017)
video
compsci
math
science
youtube.com
via
river
13 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
A review of Accelerate: The Science of Lean Software and DevOps
devops
science
keunwoo.com
via
hwayne
13 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
13
Juni: a one-handed, 12-key chorded keyboard
hardware
wiki.xxiivv.com
via
technetium
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
3
Manta Ray (Fly By) Update #2
art
hardware
electricfiredesign.com
via
williballenthin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
NAMM 22: GPU Audio - Use Your GPU For Audio Processing & Production
☶
video
art
hardware
performance
youtube.com
via
snej
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Xbox 360 Architecture
hardware
copetti.org
via
calvin
15 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
The information theory reason for assuming non-secret cryptography algorithms
cryptography
utcc.utoronto.ca
via
calvin
17 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
4
Encrypted Databases: From Theory to Systems
pdf
cryptography
databases
security
cidrdb.org
via
df
18 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
7
Sunny Cove: Intel’s Lost Generation
hardware
performance
chipsandcheese.com
via
technetium
18 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
EndBASIC. BASIC interpreter + DOS environment, reimagined
education
programming
endbasic.dev
via
Mordo
18 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
14
Have an old iPad lying around? You might be able to make it run Linux soon
hardware
linux
arstechnica.com
via
f96
19 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
19 Dubious Ways to Compute the Zeros of a Polynomial (2016)
math
blogs.mathworks.com
via
f96
19 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
39
Notkia - Linux phone in the shape of Nokia, with LoRa+WiFI+BT connectivity
hardware
linux
hackster.io
via
f96
20 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
10
Lisp Machine Inc. K-machine
hardware
historical
lisp
fare.tunes.org
via
calvin
22 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Apple Silicon “Augury” DMP Vulnerability
hardware
security
mjtsai.com
via
Gaelan
23 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
101
Installing a payphone in my house
art
hardware
bert.org
via
raymii
24 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
3
Noson S. Yanofsky - Diagonalization, Fixed Points, and Self-reference (2021)
video
compsci
math
youtube.com
via
Corbin
24 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Words for the Wordle-Weary
math
bit-player.org
via
breadbox
24 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Pong
hardware
historical
falstad.com
via
df
26 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
44
Certificate Transparency data is used to compromise WordPress before installation
cryptography
security
web
feistyduck.com
authored by
hanno
26 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
26 comments
26
37
So long, home T1 line; hello, hacking the T1 router
hardware
historical
networking
reversing
oldvcr.blogspot.com
authored by
classichasclass
26 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
<< Page 1
|
Page 3 >>