puria 🦐MA · 8 days agoCounter Galois Onion: Improved encryption for Tor circuit traffic | The Tor Projectplus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareCounter Galois Onion: Improved encryption for Tor circuit traffic | The Tor Projectplus-squarepuria 🦐MA · 8 days agomessage-square0linkfedilink
puria 🦐MA · 1 month agoKen Thompson Recalls Unix's Rowdy, Lock-Picking Originsplus-squarethenewstack.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkKen Thompson Recalls Unix's Rowdy, Lock-Picking Originsplus-squarethenewstack.iopuria 🦐MA · 1 month agomessage-square0linkfedilink
Settoletto 🍤A · 2 months agoHappy Lemmy cakeday, Puria!plus-squaremessage-squaremessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareHappy Lemmy cakeday, Puria!plus-squareSettoletto 🍤A · 2 months agomessage-square0linkfedilink
puria 🦐MA · 2 months agoNatura morta con custodia di sax. Storie di jazz - Wikipediaplus-squareit.wikipedia.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNatura morta con custodia di sax. Storie di jazz - Wikipediaplus-squareit.wikipedia.orgpuria 🦐MA · 2 months agomessage-square0linkfedilink
puria 🦐MA · 2 months agoCap'n Web: a new RPC system for browsers and web serversplus-squaremessage-squaremessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1message-squareCap'n Web: a new RPC system for browsers and web serversplus-squarepuria 🦐MA · 2 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoFOSDEM 2026 - FOSDEM 2026: 31st January and 1st Februaryplus-squarefosdem.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFOSDEM 2026 - FOSDEM 2026: 31st January and 1st Februaryplus-squarefosdem.orgpuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoHow Go Mitigates Supply Chain Attacks - The Go Programming Languageplus-squarego.devexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHow Go Mitigates Supply Chain Attacks - The Go Programming Languageplus-squarego.devpuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoHosting a WebSite on a Disposable Vape :: BogdanTheGeek's Blogplus-squarebogdanthegeek.github.ioexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHosting a WebSite on a Disposable Vape :: BogdanTheGeek's Blogplus-squarebogdanthegeek.github.iopuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoWasm 3.0 Completed - WebAssemblyplus-squaremessage-squaremessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareWasm 3.0 Completed - WebAssemblyplus-squarepuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoGitHub - mmulet/term.everything: Run any GUI app in the terminal❗plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGitHub - mmulet/term.everything: Run any GUI app in the terminal❗plus-squaregithub.compuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoEU Court of Justice Clarifies the Concept of Personal Data in the Context of a Transfer of Pseudonymized Data to Third Parties | Inside Privacyplus-squarewww.insideprivacy.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEU Court of Justice Clarifies the Concept of Personal Data in the Context of a Transfer of Pseudonymized Data to Third Parties | Inside Privacyplus-squarewww.insideprivacy.compuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoFight Chat Control - Protect Digital Privacy in the EUplus-squarefightchatcontrol.euexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkFight Chat Control - Protect Digital Privacy in the EUplus-squarefightchatcontrol.eupuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoEdizione 2025 – Borse di partecipazione per studenti e studentesse | ISFestival - Informatici Senza Frontiereplus-squarefestival.informaticisenzafrontiere.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEdizione 2025 – Borse di partecipazione per studenti e studentesse | ISFestival - Informatici Senza Frontiereplus-squarefestival.informaticisenzafrontiere.orgpuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoMeasuring the environmental impact of delivering AI at Google Scaleplus-squarearxiv.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkMeasuring the environmental impact of delivering AI at Google Scaleplus-squarearxiv.orgpuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoEncrypting Files with Passkeys and ageplus-squarewords.filippo.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEncrypting Files with Passkeys and ageplus-squarewords.filippo.iopuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 3 months agoHyperclay | HTML APPSplus-squarehyperclay.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHyperclay | HTML APPSplus-squarehyperclay.compuria 🦐MA · 3 months agomessage-square0linkfedilink
puria 🦐MA · 4 months agoPublic consultation on ”retention of data by service providers for criminal proceedings”. Answering guide for civil society organisations and individuals. - European Digital Rights (EDRi)plus-squareedri.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPublic consultation on ”retention of data by service providers for criminal proceedings”. Answering guide for civil society organisations and individuals. - European Digital Rights (EDRi)plus-squareedri.orgpuria 🦐MA · 4 months agomessage-square0linkfedilink
puria 🦐MA · 4 months agoCracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyataplus-squarecyata.aiexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyataplus-squarecyata.aipuria 🦐MA · 4 months agomessage-square0linkfedilink
puria 🦐MA · 4 months agoSurveillance Watch: They Know Who You Areplus-squarewww.surveillancewatch.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSurveillance Watch: They Know Who You Areplus-squarewww.surveillancewatch.iopuria 🦐MA · 4 months agomessage-square0linkfedilink
puria 🦐MA · 4 months agoNIST Consortium and Draft guidelines aim to improve Security in Software Developmentplus-squarewww.nist.govexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNIST Consortium and Draft guidelines aim to improve Security in Software Developmentplus-squarewww.nist.govpuria 🦐MA · 4 months agomessage-square0linkfedilink