Hacker Newsnew | past | comments | ask | show | jobs | submit | beefhash's submissionslogin
1.Donald Knuth – The Patron Saint of Yak Shaves (2015) (yakshav.es)
7 points by beefhash on Nov 21, 2020 | past
2.The Lost Art of Structure Packing (catb.org)
15 points by beefhash on Nov 14, 2020 | past
3.PokéWalker hacking: A complete device takeover and ROM dump using infrared (dmitry.gr)
149 points by beefhash on Nov 14, 2020 | past | 16 comments
4.Baby Sharks: Injecting small order points to threshold EdDSA (medium.com/zengo)
1 point by beefhash on Nov 13, 2020 | past
5.Localizing Papers, Please (2014) (dukope.tumblr.com)
1 point by beefhash on Nov 1, 2020 | past
6.J2 open processor: a clean-room open-source processor using the SuperH ISA (j-core.org)
2 points by beefhash on Oct 29, 2020 | past
7.ed(1) in Rust (github.com/ash2x3zb9cy)
5 points by beefhash on Oct 24, 2020 | past | 1 comment
8.Game theory in Mario Party (2010) (mindyourdecisions.com)
1 point by beefhash on Sept 19, 2020 | past
9.Whalescan: A vulnerability scanner for Windows containers (github.com/nccgroup)
2 points by beefhash on Sept 19, 2020 | past
10.SNIcat (Server Name Indication Concatenator) (github.com/mnemonic-no)
1 point by beefhash on Sept 15, 2020 | past
11.Reviving 20 year old web forum software (2019) (virtuallyfun.com)
3 points by beefhash on Sept 11, 2020 | past
12.Intel AMT and Intel ISM Advisory (CVSS 9.8) (intel.com)
3 points by beefhash on Sept 9, 2020 | past
13.A history of elliptic curves in tweets (vnhacker.blogspot.com)
54 points by beefhash on Sept 5, 2020 | past | 16 comments
14.The Sound of Silence: Mining Security Vulns from Secret Integration Channels (arxiv.org)
2 points by beefhash on Sept 4, 2020 | past
15.The 100% correct way to validate email addresses (medium.com/hackernoon)
2 points by beefhash on Sept 3, 2020 | past | 2 comments
16.S2n: A simple, small, fast, and security-minded C99 implementation of TLS/SSL (github.com/awslabs)
4 points by beefhash on Sept 1, 2020 | past
17.A Cryptographic Analysis of the TLS 1.3 Handshake Protocol (iacr.org)
3 points by beefhash on Aug 29, 2020 | past
18.Syzkaller – Fuzzing ReactOS in 2020 (reactos.org)
2 points by beefhash on Aug 16, 2020 | past
19.Debunking the “users always click yes” myth (emilymstark.com)
1 point by beefhash on Aug 8, 2020 | past
20.Speculative Dereferencing of Registers: Reviving Foreshadow [pdf] (arxiv.org)
168 points by beefhash on Aug 8, 2020 | past | 53 comments
21.Bootstrapping 2.11BSD (no patches) from 2.11BSD pl 195 (bsdimp.blogspot.com)
1 point by beefhash on Aug 7, 2020 | past
22.Grub2 security update renders system unbootable (redhat.com)
134 points by beefhash on July 30, 2020 | past | 85 comments
23.There's a hole in the boot: “BootHole” vulnerability in the GRUB2 bootloader [pdf] (eclypsium.com)
1 point by beefhash on July 29, 2020 | past
24.You don’t need SMS-2FA (cmpxchg8b.com)
33 points by beefhash on July 29, 2020 | past | 66 comments
25.Postal Revenue Collection in the Digital Age (2001) (springer.com)
2 points by beefhash on July 19, 2020 | past | 1 comment
26.ed(1) on the web (penalosa.dev)
2 points by beefhash on July 19, 2020 | past
27.memcpy (and friends) with NULL pointers (2016) (imperialviolet.org)
2 points by beefhash on July 18, 2020 | past
28.A font raised from the dead: The Doves Type story (2013) (typespec.co.uk)
2 points by beefhash on July 16, 2020 | past
29. [flagged] The day I trolled the entire internet: accidental research project CVE-2020-1350 (blog.zsec.uk)
56 points by beefhash on July 15, 2020 | past | 17 comments
30.How major and minor device numbers worked in V7 Unix (utcc.utoronto.ca)
2 points by beefhash on July 14, 2020 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: