Newest Stories by kyle
Home
Recent
Comments
Search
Login
9
Self-Replicating Functions
math
tylerneylon.com
via
kyle
9 months ago
|
cached
|
no comments
0
8
What Are Capabilities?
security
habitatchronicles.com
via
kyle
10 months ago
|
cached
|
1 comment
1
8
A Minimum Complete Tutorial of Linux ext4 File System
linux
medium.com
via
kyle
11 months ago
|
cached
|
2 comments
2
3
Titan in depth: Security in plaintext
hardware
security
cloudplatform.googleblog.com
via
kyle
1 year ago
|
cached
|
no comments
0
11
Real System Failures (2012)
☶
hardware
c3.nasa.gov
via
kyle
1 year ago
|
cached
|
1 comment
1
12
IoT Goes Nuclear - Creating a ZigBee Chain Reaction
pdf
hardware
security
iotworm.eyalro.net
via
kyle
1 year ago
|
cached
|
3 comments
3
43
Systems We Love
compsci
event
systemswe.love
via
kyle
1 year ago
|
cached
|
7 comments
7
4
Blurred Lines
culture
blog.jessfraz.com
via
kyle
1 year ago
|
cached
|
1 comment
1
23
Exploring Unix processes in illumos
illumos
unix
kyleisom.net
authored by
kyle
1 year ago
|
cached
|
4 comments
4
9
Experiments with disabling the ME on Sandybridge x230
hardware
security
coreboot.org
via
kyle
1 year ago
|
cached
|
7 comments
7
40
Why do we use the Linux kernel's TCP stack?
linux
networking
jvns.ca
via
kyle
2 years ago
|
cached
|
no comments
0
4
Automated to Death
practices
spectrum.ieee.org
via
kyle
2 years ago
|
cached
|
3 comments
3
17
contained.af (game for learning about capabilities and syscalls)
linux
contained.af
via
kyle
2 years ago
|
cached
|
no comments
0
11
A non-exhaustive list of ways C compilers break for objects larger than PTRDIFF_MAX bytes
c
trust-in-soft.com
via
kyle
2 years ago
|
cached
|
no comments
0
7
Pointer Overflow Checking
c
blog.regehr.org
via
kyle
2 years ago
|
cached
|
no comments
0
35
Teaching C
c
blog.regehr.org
via
kyle
2 years ago
|
cached
|
no comments
0
4
Cross Processor Cache Attacks
security
eprint.iacr.org
via
kyle
2 years ago
|
cached
|
no comments
0
11
Break a dozen secret keys, get a million more for free
security
blog.cr.yp.to
via
kyle
2 years ago
|
cached
|
1 comment
1
4
Security in an error-prone world
security
lwn.net
via
kyle
2 years ago
|
cached
|
no comments
0
15
Just Signal
android
security
whispersystems.org
via
kyle
2 years ago
|
cached
|
2 comments
2
1
An End-to-End Measurement of Certificate Revocation in the Web’s PKI
pdf
security
cs.umd.edu
via
kyle
2 years ago
|
cached
|
no comments
0
99
What Happens Next Will Amaze You
☶
law
privacy
web
idlewords.com
via
kyle
2 years ago
|
cached
|
31 comments
31
7
Defasm
☶
lisp
programming
malisper.me
via
kyle
2 years ago
|
cached
|
no comments
0
3
Let's talk about iMessage (again)
security
blog.cryptographyengineering.c
om
via
kyle
2 years ago
|
cached
|
no comments
0
9
Defaddress
☶
lisp
programming
malisper.me
via
kyle
3 years ago
|
cached
|
no comments
0
Page 2 >>