|
|
| 1. | | Unmasking the Privacy Risks of Apple Intelligence (lumia.security) | | 101 points by mroi 8 months ago | past | 23 comments | |
| 2. | | OpenAI Limits Data Inspection for (Most) Organizations (lumia.security) | | 4 points by mroi 8 months ago | past | 1 comment | |
| 3. | | Scaling out with Prometheus (perimeterx.com) | | 1 point by mroi on April 9, 2018 | past | |
| 4. | | Zero-downtime deployment with Docker and HAProxy (perimeterx.com) | | 21 points by mroi on Dec 5, 2016 | past | |
| 5. | | When Kafka met Bruce: How one service can boost app messaging reliability (perimeterx.com) | | 3 points by mroi on Nov 4, 2016 | past | |
| 6. | | “There and Back Again” – The Story of a Stream (processing) (perimeterx.com) | | 6 points by mroi on Oct 20, 2016 | past | 1 comment | |
| 7. | | Hijacking a User’s Shadow: Affiliate Fraud via Malicious Extensions (perimeterx.com) | | 11 points by mroi on July 7, 2016 | past | |
| 8. | | Reverse Engineering Sneaker Bots – Stealing Your New Shoes (perimeterx.com) | | 14 points by mroi on May 4, 2016 | past | 1 comment | |
| 9. | | Blocking Tor: A Case for Better Detection (perimeterx.com) | | 9 points by mroi on April 6, 2016 | past | |
| 10. | | Critical security vulnerability in Bugzilla (perimeterx.com) | | 7 points by mroi on Sept 17, 2015 | past | |
| 11. | | Sniffing off the air NRF24L01+ and Bluetooth LE packets for under $30 (cyberexplorer.me) | | 7 points by mroi on Jan 21, 2014 | past | 4 comments | |
| 12. | | Improving VM to VM network throughput on an ESXi platform (cyberexplorer.me) | | 1 point by mroi on March 29, 2013 | past | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|