8 million requests later, we made the SolarWinds supply chain attack look amateur security.cyber Article 10 411 words, published Feb 4 2025 10 votes
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform security.cyber privacy Link 50 votes
Post-OCSP certificate revocation in the Web PKI security Article 4999 words, published Sep 25 2024 2 votes
Slowly booting full Linux on the intel 4004 for fun, art, and absolutely no profit linux hardware Article 19 015 words 10 votes
Slowly booting full Linux on the intel 4004 for fun, art, and absolutely no profit linux hardware Article 19 007 words 18 votes
Retrospective on the introduction of the Vanguard anti-cheat software to League of Legends Article 4597 words, published Aug 22 2024 16 votes
How we used esbuild to reduce our browser extension build times by 90% web development Article 3157 words 12 votes
Significant cyber incidents | Strategic technologies program security.cyber Article 8881 words 1 vote
A 2024 plea for lean software security programming languages open source Article 2960 words, published Jan 18 2024 36 votes
For the first time: system roms, data dumps, scans and photographs, and a MAME driver for the little-known Sega AI Article 4329 words 13 votes
The Inside Story of PC Magazine, PC World, and Macworld's Origins, as Told by David Bunnell Article 10 605 words 8 votes
Forth: The programming language that writes itself programming languages programming.concatenative Article 32 703 words 10 votes
The Early History Of Smalltalk programming languages programming.object oriented Article 23 490 words 7 votes
We spoke with the last person standing in the floppy disk business hardware Article 3484 words, published Sep 12 2022 11 votes
The Great Fiction of AI | The strange world of high-speed semi-automated genre fiction Article published Jul 20 2022 9 votes