Hacker Newsnew | past | comments | ask | show | jobs | submit | amboar's submissionslogin
1.Inhibiting a covert attack on the Bitcoin POW function (linuxfoundation.org)
3 points by amboar on April 6, 2017 | past
2.Australian Census 2016: Error messages abound (smh.com.au)
12 points by amboar on Aug 9, 2016 | past | 2 comments
3.Regsvr32.exe: Bypass Application Whitelisting Script Protections (subt0x10.blogspot.com)
5 points by amboar on April 22, 2016 | past
4.Australian Cyber Security Centre 2015 Threat Report [pdf] (acsc.gov.au)
1 point by amboar on Nov 3, 2015 | past
5.Reagents: Expressing and Composing Fine-Grained Concurrency (lambda-the-ultimate.org)
46 points by amboar on Aug 30, 2015 | past
6.ALIVe: Automatic LLVM InstCombine Verifier (regehr.org)
1 point by amboar on July 24, 2014 | past
7.Time-coding audio files (windytan.com)
3 points by amboar on June 14, 2014 | past
8.Effects of packet/data sizes on various networks (ozlabs.org)
1 point by amboar on May 28, 2014 | past
9.How I fail to design software (programmingisterrible.com)
1 point by amboar on May 19, 2014 | past
10.Murphys Law and those of similar ilk (preterhuman.net)
1 point by amboar on May 11, 2014 | past
11.Java arrays, Wat? (vanillajava.blogspot.com.au)
1 point by amboar on April 28, 2014 | past
12.NFC, Credit Cards and exposed data (flameeyes.eu)
1 point by amboar on April 21, 2014 | past | 1 comment
13.Real-world Secure Boot attacks (advogato.org)
2 points by amboar on April 14, 2014 | past
14.ARM bases Compiler 6 on Clang/LLVM (semiaccurate.com)
5 points by amboar on April 8, 2014 | past
15.Legal Questions About LocalBitcoins.com and Australia (ozlabs.org)
2 points by amboar on March 24, 2014 | past
16.Gerrit v2.8.3: Fixes serious bugs in merge strategies (groups.google.com)
1 point by amboar on March 17, 2014 | past
17.Cracking Linksys “Encryption” (devttys0.com)
132 points by amboar on March 3, 2014 | past | 46 comments
18.Embedded in Academia: Let’s Work on an LLVM Superoptimizer (regehr.org)
5 points by amboar on March 3, 2014 | past
19.On Java 8′s introduction of Optional (jooq.org)
1 point by amboar on March 2, 2014 | past
20.Hardware Transactional Memory in Java (vanillajava.blogspot.com.au)
2 points by amboar on Feb 2, 2014 | past
21.Inversion of Meaning (benno.id.au)
3 points by amboar on Dec 16, 2013 | past
22.Catching pointer overflow bugs (wdtz.org)
2 points by amboar on Nov 19, 2013 | past
23.A primer on elliptic curve cryptography (arstechnica.com)
53 points by amboar on Nov 9, 2013 | past | 15 comments
24.The 2013 Kernel Summit (lwn.net)
2 points by amboar on Nov 8, 2013 | past
25.Seven reasons why closed source is better than open source (opensource.com)
2 points by amboar on Nov 7, 2013 | past | 2 comments
26.CCAN: The C Code Archive (ccodearchive.net)
4 points by amboar on Oct 14, 2013 | past
27.A path forward for an LLVM toolchain on Windows (llvm.org)
10 points by amboar on Sept 6, 2013 | past | 1 comment
28.On kernel mailing list behavior (lwn.net)
2 points by amboar on July 18, 2013 | past
29.Oracle knew about critical Java flaws since April (theregister.co.uk)
179 points by amboar on Aug 30, 2012 | past | 88 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: