Links
Add
Secure Boot is completely broken on 200+ models from 5 big device makers | Ars Technica
arstechnica.com/security/2024/07/secure-bo...
arstechnica.com/security/2024/07/secure-bo...
Added 1 month ago
Wie Russland EU-Firmen für Doppelgänger-Propaganda nutzt
correctiv.org/faktencheck/russische-desinf...
correctiv.org/faktencheck/russische-desinf...
Scaling One Million Checkboxes to 650,000,000 checks | eieio.games
eieio.games/essays/scaling-one-million-che...
eieio.games/essays/scaling-one-million-che...
No Tags
Added 2 months ago
Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine | JFrog
jfrog.com/blog/leaked-pypi-secret-token-re...
jfrog.com/blog/leaked-pypi-secret-token-re...
Added 1 month ago
Tech Companies Turned Ukraine Into an AI War Lab | TIME
time.com/6691662/ai-ukraine-war-palantir
time.com/6691662/ai-ukraine-war-palantir
Added 1 month ago
Data centers draining resources in water-stressed communities - The University of Tulsa
utulsa.edu/news/data-centers-draining-reso...
utulsa.edu/news/data-centers-draining-reso...
Added 2 months ago
Undercover im Regierungsviertel: Das Lobbyismus-Experiment | abgeordnetenwatch.de
www.abgeordnetenwatch.de/recherchen/lobbyi...
www.abgeordnetenwatch.de/recherchen/lobbyi...
No Tags
Added 2 months ago
The best resources for designers in one place - bookmarks.design
www.bookmarks.design
www.bookmarks.design