Sublime
An inspiration engine for ideas
Hacks
Adam Little • 1 card
GitHub - Dimillian/IceCubesApp: A SwiftUI Mastodon client
github.com
Vulnerability-specific attacks Exploiting buffer overflows or other software defects
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Serverless Statusphere: a walk through building serverless ATProto applications on Cloudflare’s Developer Platform
blog.cloudflare.com
Password Storage Cheat Sheet, Cryptographic Storage Cheat Sheet Guide to Cryptography Kevin Wall’s Signs of broken auth (& related posts) John Steven’s Securing password digests IETF RFC2898, RFC5869 scrypt, IETF Memo: scrypt for Password-based Key Derivation Open Wall’s Password security: past, present, future These should provide some additio
... See moreLee Brotherston, Amanda Berlin • Defensive Security Handbook

cryptocurrencies/blockchain/web3 lol
But regular end-users, even engineers, cannot assess safety based on model weights. And prompt injection remains a large attack vector.