Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
freddyb
.
3
Traversal-resistant file APIs
go
security
go.dev
via
freddyb
5 hours ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
1
Carefully But Purposefully Oxidising Ubuntu
linux
rust
discourse.ubuntu.com
via
freddyb
7 hours ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Can I use Secure Curves in the Web Platform?
cryptography
web
blogs.igalia.com
via
freddyb
34 hours ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
31
Undocumented "backdoor" found in Bluetooth chip used by a billion devices
2
security
bleepingcomputer.com
via
freddyb
4 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
32 comments
32
7
How to distrust a CA without any certificate errors
security
dadrian.io
via
freddyb
5 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
31
Zen and the Art of Microcode Hacking
reversing
security
bughunters.google.com
via
freddyb
7 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
57
Why are QR Codes with capital letters smaller than QR codes with lower-case letters?
practices
web
shkspr.mobi
via
freddyb
17 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
12
Open letter to browser and OS makers
security
web
medium.com/@boblord
via
freddyb
19 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
59 comments
59
1
GymTok: Breaking TLS Using the Alt-Svc Header
networking
security
web
blog.pspaul.de
via
freddyb
21 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Multiple Vulnerabilities in U-Boot
security
openwall.com
via
freddyb
21 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
124
Reviewing the Cryptography Used by Signal
cryptography
soatok.blog
via
freddyb
22 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
17
First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200)
security
blog.quarkslab.com
via
freddyb
26 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Launching Interop 2025
browsers
web
hacks.mozilla.org
via
freddyb
26 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
35
getaddrinfo sucks. everything else is much worse
networking
valentin.gosu.se
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
16 comments
16
11
A Brief History of Code Signing at Mozilla
cryptography
practices
security
hearsum.ca
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
The Patient Programmer
practices
web
dbushell.com
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
23
How I Use "AI"
ai
practices
nicholas.carlini.com
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
31 comments
31
37
The preview of -fbounds-safety is now accessible to the community
c
c++
security
discourse.llvm.org
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
33 comments
33
9
Let’s talk about AI and end-to-end encryption
ai
privacy
security
blog.cryptographyengineering.com
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
Mozilla Localization in 2024
ai
practices
blog.mozilla.org
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
Announcing Six Day and IP Address Certificate Options in 2025
security
letsencrypt.org
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
61
Is Memory64 actually worth using?
wasm
spidermonkey.dev
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
33 comments
33
8
Understanding Memory Management, Part 1: C
security
educatedguesswork.org
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
44
Backdooring Your Backdoors - Another $20 Domain, More Governments
security
labs.watchtowr.com
via
freddyb
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
1
Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery - Introducing CSPT2CSRF
security
web
blog.doyensec.com
via
freddyb
2 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>