upcarta
Sign In
Sign Up
Explore
Search
Computer security
Follow
22
Followers
Most Recommended
Recent Content
Most Recommended
Article
Podcast episode
Tweet
Video
Book
Paper
Website
Blog
Course
Channel
Podcast
Series
Documentary
Tweet
Mar 5, 2023
🧵 1) Nostr is 👍, but there are limitations and serious risks associated with using Nostr for your identity. Let's take a closer look at what the issues are, why it needs to be solved and why using Nostr for identity can increase the risk of security
by
Level39
Post
Add to Collection
Mark as Completed
Tweet
Jun 6, 2023
30% is the average success rate of phishing attacks according to some reports! Do you know that you can be one of those victims at any time? Here's a list of tips to help you assess the legitimacy of an email: 👇 twitter.com/hasan_3wada/status/1666
by
Hasan Awada
Post
Add to Collection
Mark as Completed
Tweet
May 20, 2023
In programming, security is essential. Here are 8 simple but effective strategies for API development:
by
Nikki Siapno
Post
Add to Collection
Mark as Completed
Tweet
May 14, 2023
3. Munger on Envy Envy is the worst negative-sum game. 1. The envious person is miserable 2. The envied person is under attack It's a virus of the mind that eats joy from everyone involved. twitter.com/george__mack/status/1657787521517117440/phot
by
George Mack
Post
Add to Collection
Mark as Completed
Tweet
May 4, 2023
Last night, I fell in love with a cyber squatter. This dude did it all - some homework on me, some false urgency, some flattery. Seriously, I want to be in business with him. Screenshots follow. This dude has skills - I'm seriously impressed.
by
Jon Matzner
Post
Add to Collection
Mark as Completed
Tweet
Apr 17, 2023
The threat of AI on Cybersecurity (and what to do about it):
by
Chris Staudinger
Post
Add to Collection
Mark as Completed
Tweet
Mar 10, 2023
The ML community is fond of adopting methods from safety & security engineering. But the rampant co-opting and misuse of established terms and techniques (e.g., “safety”, red teaming) is counterintuitive to actual safety. So we wrote a paper on it: d
by
Dr Heidy Khlaaf (هايدي خلاف)
Post
Add to Collection
Mark as Completed
Tweet
Mar 5, 2023
Given the large number of PoS blockchains there are now with a wide variety of value securing them, how many hacks have there been where PoS has been compromised? Whereas how many hacks have there been due to smart contract vulnerabilities / multisi
by
Seq
Post
Add to Collection
Mark as Completed
Tweet
Mar 2, 2023
🧵Biden has released his "National Cybersecurity Strategy". It's just police-state thuggery designed to kill innovation on the Internet. It says it wants innovation -- but only on their terms, with the jackboot of police-state oppression on your neck.
by
Robert Graham
Post
Add to Collection
Mark as Completed
Tweet
Feb 27, 2023
There is a very simple and very true case for regulating AI systems that everyone can understand: We are rapidly building better and better AI systems and we fundamentally do not understand how these systems work
by
Jeffrey Ladish
Post
Add to Collection
Mark as Completed
Tweet
Feb 6, 2023
Have you ever noticed that the save icon is a floppy disk, even though they became obsolete twenty years ago? That's called a "skeuomorph" - when something new takes on the appearance of what it replaced. And once you start to look, they're everywh
by
The Cultural Tutor
Post
Add to Collection
Mark as Completed
Tweet
Nov 26, 2022
@gakonst There is interesting discussion on hacker news about that exact topic. TL;DR; Works only for sequential reads, but with some magic hardware you can also get similar results for random reads news.ycombinator.com/item?id=33751266
by
Marek Kirejczyk
Post
Add to Collection
Mark as Completed
Load More