Lockdown LLMs: Unleashing AI Power While Safeguarding User Privacy
dev.to·10h·
Discuss: DEV
🏰Capability Machines
Algebraic Types are not Scary
blog.aiono.dev·8h·
Type Checking
Where did DNSSEC go wrong?
blog.apnic.net·1d·
Discuss: Hacker News
🔐Capability Protocols
Building Resilient IT Infrastructure From the Start
darkreading.com·5h
🛡️Capability Security
Inboxfuscation: Because Rules Are Meant to Be Broken
permiso.io·1d·
Discuss: Hacker News
🔐Security Types
Smart Meters: A Growing Target in Data Security
blogger.com·2h
🔐Security Types
[NodeBook] Understanding Buffers in Node.js - Why they exist, where they live in memory, and how they handle binary data
thenodebook.com·12h·
Discuss: r/node
🔢Binary Formats
From Theory to the Field: Why Side-Channel Protection Defines Post-Quantum Security
design-reuse.com·11h
🏰Capability Machines
IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.org·8h·
Discuss: Hacker News
📡Network Serialization
Open Security News week 37-2025
nocomplexity.com·1d
🛡️Capability Security
Aviation Runway Cyber Range Security Case Study
pixelstech.net·10h
🛡️Taint Analysis
[ CDC]
dev.to·5h·
Discuss: DEV
📮Persistent Queues
When AI Writes Code, Who Secures It?
oreilly.com·8h
🏰Capability Machines
Semantic Dictionary Encoding
falvotech.com·4h·
Discuss: Hacker News
🗂️Type Indexing
What is Algebraic about Algebraic Effects?
interjectedfuture.com·3h
💫Effect Systems
A Day in the Life of a Risk Operations Center (ROC) Analylst
insight.scmagazineuk.com·3h
🛡️Taint Analysis
Confidential VMs: The core of confidential containers
developers.redhat.com·12h
🛡️Capability VMs
ECMAScript TC39 proposal-pattern-matching
github.com·5h·
Discuss: Hacker News
🎯Pattern Matching
Most enterprise AI use is invisible to security teams - Help Net Security
news.google.com·13h
🛡️Capability VMs
UAB professor’s invention becomes an International Standard in cybersecurity
uab.edu·3h
🔐Security Types