Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
fcbsd
.
10
Internet of Skull
art
hardware
mle-online.com
via
fcbsd
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
22
On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? (2021)
☶
pdf
ai
dl.acm.org
via
fcbsd
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
36
Exploiting aCropalypse: Recovering Truncated PNGs
security
da.vidbuchanan.co.uk
via
fcbsd
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Reviewing Pull Requests (2019)
practices
programming
vcs
chelseatroy.com
via
fcbsd
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Using Go's runtime/cgo to pass values between C and Go
c
go
arsenm.dev
via
fcbsd
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Real World Adversarial Attacks on Object Detectors
pdf
compsci
security
arxiv.org
via
fcbsd
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Fixing Firmware File Systems
linux
reversing
blog.stackattack.net
via
fcbsd
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Intro to Embedded RE Part 1: Tools and Series Overview
reversing
voidstarsec.com
via
fcbsd
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
The Problems with Threads (2006)
pdf
programming
eecs.berkeley.edu
via
fcbsd
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
48
InAppBrowser.com
ios
security
krausefx.com
via
fcbsd
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
34
Who's hiring? Q3Y2022
☶
job
authored by
fcbsd
11 months ago
|
28 comments
28
1
uproot-browser
python
visualization
github.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
71
Introduction to Apple Silicon
hardware
linux
mac
github.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
15
VIM - Minimal Setup Explained
vim
guckes.net
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
46
Zig
compilers
zig
mitchellh.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
3
Data ex machina (2017)
ai
vickiboykis.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Tools for Thought (2016)
math
visualization
acko.net
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Learning to Break Deep Perceptual Hashing
☶
pdf
security
arxiv.org
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
SeeYouCM-Thief
python
security
github.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
29
VoLTE/VoWiFi research with $0 of equipment: set up a phone network over Wi-Fi calling
☶
mobile
worthdoingbadly.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
Hacking a VW Golf Power Steering ECU
hardware
security
blog.willemmelching.nl
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
23
MS Teams: 1 feature, 4 vulnerabilities
security
positive.security
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
14
LAPD: Hidden Spy Camera Detection using Smartphone Time-of-Flight Sensors
pdf
security
dl.acm.org
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Incremental backup with strong cryptographic confidentiality baked into the data model
c
release
github.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
On logical inference over brains, behaviour, and artificial neural networks
pdf
ai
psyarxiv.com
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
Page 2 >>