Newest Stories by jstoja
Home
Recent
Comments
Search
Login
5
FakesApp: A Vulnerability in WhatsApp
security
research.checkpoint.com
via
jstoja
18 days ago
|
cached
|
no comments
0
5
[1807.04271] A quantum-inspired classical algorithm for recommendation systems
math
programming
arxiv.org
via
jstoja
25 days ago
|
cached
|
no comments
0
-2
Application Delivery with HashiCorp
devops
hashicorp.com
via
jstoja
1 month ago
|
cached
|
no comments
0
5
Walkthrough for Portable Services
devops
systemd
0pointer.net
via
jstoja
1 month ago
|
cached
|
no comments
0
8
Containers, Security, and Echo Chambers
devops
security
blog.jessfraz.com
via
jstoja
2 months ago
|
cached
|
no comments
0
12
Possible BGP hijack of 1.1.1.0/24
networking
security
bgpstream.com
via
jstoja
2 months ago
|
cached
|
no comments
0
7
Master password in Firefox or Thunderbird? Do not bother!
browsers
security
palant.de
via
jstoja
5 months ago
|
cached
|
no comments
0
3
Wire's Rust implementation of the Double Ratchet Algorithm
crypto
rust
github.com
via
jstoja
6 months ago
|
cached
|
no comments
0
5
6 practices for super smooth Ansible experience
devops
hakunin.com
via
jstoja
7 months ago
|
cached
|
2 comments
2
14
Introducing ProtonMail Bridge, email encryption for Outlook, Thunderbird, and Apple Mail
security
protonmail.com
via
jstoja
8 months ago
|
cached
|
2 comments
2
0
Individual and corporate ethics - The parable of the Sadhu (1983)
pdf
culture
philosophy
faculty.cbpa.drake.edu
via
jstoja
10 months ago
|
cached
|
no comments
0
6
Monitoring in the time of Cloud Native
devops
medium.com
via
jstoja
10 months ago
|
cached
|
no comments
0
21
Instagram is listening to you: a scary experiment
mobile
privacy
security
medium.com
via
jstoja
1 year ago
|
cached
|
31 comments
31