Secure Remote Password (SRP) protocol
dev.to·3d·
Discuss: DEV
🔐Capability Protocols
Flag this post
3 Minutes to Start Your Research in Nearest Neighbor Search
romanbikbulatov.bearblog.dev·2d·
Discuss: Hacker News
📐Succinct Data Structures
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·17h·
Discuss: Hacker News
📊Profiling
Flag this post
Making Every 5x5 Nonogram: Part 1
patreon.com·8h·
Discuss: Hacker News
🪢Rope Data Structures
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.com·1d·
Discuss: Hacker News
🔗Borrowing Extensions
Flag this post
De Bruijn Numerals
text.marvinborner.de·1d·
Discuss: Hacker News
λLambda Calculus
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.com·1d·
Discuss: Substack
🌐Network Protocols
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.com·6h
🛡️Security Type Systems
Flag this post
The Abode of Salvation
rohanparanjpe.substack.com·8h·
Discuss: Substack
🐹Minimal Go
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.media·13h·
Discuss: Hacker News
🛡️Parser Security
Flag this post
Timing Attacks: Extracting Secrets One Microsecond at a Time ⏱️
instatunnel.my·5d·
Discuss: r/devops
🔗Hash Algorithms
Flag this post
The cryptography behind electronic passports
blog.trailofbits.com·19h·
Discuss: Hacker News
🛡️Security Type Systems
Flag this post
Guide: Self-hosting and automating music with slskd, gonic, wrtag, traefik from scratch
blog.0007823.xyz·10h·
Discuss: r/selfhosted
🏠indieweb
Flag this post
A problem that takes quantum computers an unfathomable amount of time to solve
phys.org·19h
🎯Bit-Vector Algorithms
Flag this post
Google’s Quantum Breakthrough Rekindles Concerns About Bitcoin’s Long-Term Security
blogger.com·13h
🔄Nanopass
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·13h
🎲Property Testing
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.com·19h
🛡️Taint Analysis
Flag this post
Signal’s Post-Quantum Cryptographic Implementation
schneier.com·2d·
Discuss: Hacker News
📡Binary Protocols
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.org·2d·
Discuss: Hacker News
🛡️Security Type Systems
Flag this post
Discovering JavaScript's Hidden Secrets: Understanding String Matching Algorithms.
dev.to·1d·
Discuss: DEV
🔤String Algorithms
Flag this post