| user: | transpute |
| created: | January 4, 2015 |
| karma: | 13.1k |
| 1. | Android Intrusion Logging as new source of data for consensual forensic analysis(securitylab.amnesty.org) |
| 2. | Private Post-Training and Inference with TEEs for Frontier Models(workshoplabs.ai) |
| 3. | Slightly safer vibecoding by adopting old hacker habits(addxorrol.blogspot.com) |
| 4. | BIO: The RISC Bao I/O Coprocessor(bunniestudios.com) |
| 5. | |
| 6. | |
| 7. | 70 days ago | discuss |
| 8. | FlashKeeper: Where SpiSpy meets Stateless Laptop (2024)(cfp.3mdeb.com) |
| 9. | Designing Secure Software(designingsecuresoftware.com) |
| 10. | Google-Intel Joint TDX Security Review [video](youtube.com) |
| 11. | |
| 12. | |
| 13. | |
| 14. | |
| 15. | Trying to Access ZFS-Encrypted SSD Following a Kernel Update Failure (2025)(forums.linuxmint.com) |
| 16. | Open-Source Ecosystem Whale Falls(nesbitt.io) |
| 17. | |
| 18. | |
| 19. | |
| 20. | |
| 21. | Systemic Software Debugging - Sony Ericsson Course Material (2012)(systemicsoftwaredebugging.com) |
| 22. | |
| 23. | |
| 24. | How not to securely erase a NVME drive (2022)(peterbabic.dev) |
| 25. | Introduction to Building Swift for Yocto(xtremekforever.substack.com) |
| 26. | 109 days ago | discuss |