Tuta Introduces Key Verification
tuta.comยท13hยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post
Bit counting and geometric series
veitner.bearblog.devยท15h
๐Ÿ”Cryptography
Flag this post
Signed URLs on ESP32
blog.golioth.ioยท2dยท
๐Ÿ”Cryptography
Flag this post
Nebius Token Factory: Open Model Platform for Production Inference
windowsforum.comยท1d
๐ŸŒDistributed Systems
Flag this post
Securing critical infrastructure: Why Europeโ€™s risk-based regulations matter
microsoft.comยท1d
๐Ÿ”ŒNetwork Programming
Flag this post
Stop Coding and Start Planning
kill-the-newsletter.comยท18h
๐Ÿ”ŒNetwork Programming
Flag this post
Beyond computational assumptions: How BGKW replaced hardness with isolation
reddit.comยท2dยท
Discuss: r/compsci
๐Ÿ”Cryptography
Flag this post
AI usage in learning
reddit.comยท19hยท
Discuss: r/embedded
๐Ÿ“ˆComplexity Theory
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.netยท1d
โš–๏ธLogic Programming
Flag this post
Cancer; A Crime Story (and other tales of optimization gone wrong)
lesswrong.comยท3h
๐ŸงซCellular Automata
Flag this post
API-Led Connectivity - Practical Questions Answered - Part III
dev.toยท2dยท
Discuss: DEV
๐Ÿ—๏ธSoftware Architecture
Flag this post
Introducing a Go linter bringing Rust style exhaustiveness checking of sum types to Go interfaces.
reddit.comยท22hยท
Discuss: r/golang
๐ŸงฎProgramming Language Theory
Flag this post
Building Custom Components in Langflow ๐Ÿ› ๏ธ
dev.toยท2dยท
Discuss: DEV
๐ŸงฎProgramming Language Theory
Flag this post
Programming Languages Lie: Variables Arenโ€™t What You Think They Are
dev.toยท1dยท
Discuss: DEV
๐ŸงฎProgramming Language Theory
Flag this post
Agentic World Modeling for 6G: Near-Real-Time Generative State-Space Reasoning
arxiv.orgยท2d
๐ŸŽฒProbabilistic Programming
Flag this post
Steering the Flow: Network Control Through Mathematical Optimization
dev.toยท15hยท
Discuss: DEV
๐Ÿ”ŒNetwork Programming
Flag this post
Analyzing Network Traffic with AI: Introducing mcp-wireshark (Wireshark + MCP)
dev.toยท2hยท
Discuss: DEV
๐Ÿ”ŒNetwork Programming
Flag this post
Show HN: Refusal-Aware Logical Framework for LLMs
github.comยท2dยท
Discuss: Hacker News
๐ŸงฉTheorem Proving
Flag this post
Tool-Driven Behavioral Directives: How to Scale LLM Agents Without Prompt Spaghetti
dev.toยท8hยท
Discuss: DEV
๐Ÿ—๏ธSoftware Architecture
Flag this post