Newest Stories by jcs
Home
Recent
Comments
Search
Login
10
FBI’s use of Tor exploit is like peering through “broken blinds”
law
privacy
security
arstechnica.com
via
jcs
2 years ago
|
cached
|
16 comments
16
12
goed: a terminal based code editor / development environment
programming
release
github.com
via
jcs
2 years ago
|
cached
|
1 comment
1
7
Shenzhen: A new breed of intellectual property (Part 3)
video
hardware
law
youtube.com
via
jcs
2 years ago
|
cached
|
1 comment
1
18
neomutt: gathering all the patches against Mutt
release
unix
github.com
via
jcs
2 years ago
|
cached
|
1 comment
1
8
Police are filing warrants for Android’s vast store of location data
privacy
theverge.com
via
jcs
2 years ago
|
cached
|
1 comment
1
6
sysrandom: Secure random number generation for Ruby using system RNG facilities
ruby
security
github.com
via
jcs
2 years ago
|
cached
|
no comments
0
32
W^X now mandatory in OpenBSD
openbsd
security
undeadly.org
via
jcs
2 years ago
|
cached
|
13 comments
13
14
Untrusting [Blue Coat] CA on OS X
mac
security
blog.filippo.io
via
jcs
2 years ago
|
cached
|
no comments
0
8
Petition for Intel to Release an ME-less CPU design
hardware
puri.sm
via
jcs
2 years ago
|
cached
|
1 comment
1
10
Even the Deathstation 9000 can't screw up the BIND 9.10.4 fix
c
fanf.livejournal.com
via
jcs
2 years ago
|
cached
|
no comments
0
17
letskencrypt: a Let's Encrypt client with a strong focus on security
c
security
web
github.com
via
jcs
2 years ago
|
cached
|
2 comments
2
18
The Panic Sign
hardware
panic.com
via
jcs
2 years ago
|
cached
|
1 comment
1
9
Millions of Arris cable modems vulnerable to denial-of-service flaw
networking
security
zdnet.com
via
jcs
2 years ago
|
cached
|
4 comments
4
30
30 years later, QBasic is still the best
☶
programming
nicolasbize.com
via
jcs
2 years ago
|
cached
|
10 comments
10
13
Node.js and Socket.IO: How Security Fails When 'null' Is 'false'
javascript
security
cigital.com
via
jcs
2 years ago
|
cached
|
1 comment
1
7
Former Tor developer created malware for the FBI to hack Tor users
person
security
dailydot.com
via
jcs
2 years ago
|
cached
|
no comments
0
3
Jam API: a service that allows you to turn any site into a JSON accessible api using CSS selectors
api
jamapi.xyz
via
jcs
2 years ago
|
cached
|
1 comment
1
12
Webkit Updating Its Prefixing Policy
browsers
web
webkit.org
via
jcs
2 years ago
|
cached
|
no comments
0
7
Installing ElectroBSD the "hard" way ... by exploiting HardenedBSD
freebsd
security
fabiankeil.de
via
jcs
2 years ago
|
cached
|
2 comments
2
10
GitHub’s CSP journey
security
web
githubengineering.com
via
jcs
2 years ago
|
cached
|
no comments
0
53
New hat request system
☶
announce
lobste.rs
via
jcs
2 years ago
|
cached
|
22 comments
22
19
The revenge of the listening sockets
debugging
linux
blog.cloudflare.com
via
jcs
2 years ago
|
cached
|
no comments
0
12
E7 E7 E7 EE: the story of the greatest copy protection ever invented
video
assembly
historical
reversing
archive.org
via
jcs
2 years ago
|
cached
|
1 comment
1
63
My Heroic and Lazy Stand Against IFTTT
api
blog.pinboard.in
via
jcs
2 years ago
|
cached
|
15 comments
15
23
ICANN to end direct US government oversight control of administering the internet
networking
theguardian.com
via
jcs
2 years ago
|
cached
|
2 comments
2
<< Page 3
|
Page 5 >>