Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by feross
A Breach, or Just a Forced Password Reset?
2 points
feross
2018-12-04T22:33:11Z
krebsonsecurity.com
New in Chrome 71
3 points
feross
2018-12-04T22:04:48Z
developers.google.com
Vimways – A Vim-themed advent calendar
2 points
feross
2018-12-04T21:05:38Z
vimways.org
The Ars Holiday Gift Guide 2018–good tech for the power user in your life
1 points
feross
2018-12-04T20:54:20Z
arstechnica.com
A color palette generator for the design 'impaired'
1 points
feross
2018-12-03T19:08:02Z
learnui.design
Jared, Kay Jewelers Parent Fixes Data Leak
1 points
feross
2018-12-03T18:02:37Z
krebsonsecurity.com
Securify: practical security analysis of smart contracts
2 points
feross
2018-12-03T06:01:38Z
blog.acolyer.org
What the Marriott Breach Says About Security
5 points
feross
2018-12-01T23:08:39Z
krebsonsecurity.com
Palm Phone Review: Fun, endearing, and bad at everything
2 points
feross
2018-12-01T15:09:58Z
arstechnica.com
How $3.8M in seed funding started Gatsby as an open source company
3 points
feross
2018-12-01T09:44:45Z
changelog.com
LEMNA: explaining deep learning based security applications
40 points
feross
2018-11-30T06:47:21Z
blog.acolyer.org
Flipping Bits in Memory Without Accessing Them: Study of DRAM Disturbance Errors [pdf]
2 points
feross
2018-11-30T00:27:44Z
users.ece.cmu.edu
Underground Economy: Framing Dependencies Introduced by Commoditization [pdf]
2 points
feross
2018-11-30T00:09:13Z
static.googleusercontent.com
Click Trajectories: End-To-End Analysis of the Spam Value Chain [pdf]
5 points
feross
2018-11-29T23:16:59Z
cseweb.ucsd.edu
Understanding the Mirai Botnet [pdf]
2 points
feross
2018-11-29T22:17:02Z
www.usenix.org
Exploring Information Leakage in Third-Party Compute Clouds (2009) [pdf]
10 points
feross
2018-11-29T21:34:17Z
hovav.net
Reflections on Trusting Trust [pdf]
2 points
feross
2018-11-29T17:03:34Z
www.archive.ece.cmu.edu
Pixel Slate Review: Paying the “Google” Premium for Chrome OS
1 points
feross
2018-11-29T16:38:54Z
arstechnica.com
Pacemakers: Software Radio Attacks and Zero-Power Defenses [pdf]
2 points
feross
2018-11-29T16:20:49Z
www.secure-medicine.org
Comprehensive Experimental Analyses of Automotive Attack Surfaces [pdf]
1 points
feross
2018-11-29T07:02:44Z
www.autosec.org
312
313
314
315
316
317
318
319
320
321