The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·21h·
Discuss: Hacker News
🛡️Capability Security
A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.com·4d
🔄Protocol State Machines
New Recording on Event modelling anti-patterns from DDDEU
architecture-weekly.com·4h
🌊Reactive Languages
My custom two realtime concurrency primitives
blog.inkreas.ing·1d·
Discuss: r/rust
🔗Concurrency Primitives
Misunderstood and Misaligned
bozhao.substack.com·7h·
Discuss: Substack
🔍ML Language
Fitting It All in Your Head
systemsapproach.org·6h
🌍Minimal HTTP
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1h
🏷️Memory Tagging
Simple hash map in C, for learning purpose
reddit.com·2h·
🏷️Symbol Interning
Java Annotated Monthly – October 2025
blog.jetbrains.com·5h
💬Smalltalk VMs
Show HN: Is-Kit – Lightweight TypeScript Guard and Validator Toolkit
github.com·1d·
Discuss: Hacker News
🔧API Design
smartgo: I wish for a Go-like language with Rust-like pointers
iio.ie·10h
🔒Rust Borrowing
Higher-Level Design Patterns
qouteall.fun·3d·
Discuss: Hacker News
Algebraic Effects
A practical approach to AI safety
david-gilbertson.medium.com·3h·
Discuss: r/programming
🛡️Security Type Systems
Multi Client TCP Chat with Tkinter
dev.to·1d·
Discuss: DEV
🌍Minimal HTTP
OpenSSH 10.1/10.1p1 Released
openssh.com·5h·
Discuss: Hacker News
🔗Hash Functions
Souvenir
deprogrammaticaipsum.com·10h
🔗Weak References
SPQA: The AI-Based Architecture That'll Replace Most Existing Software
danielmiessler.com·13h·
Discuss: Hacker News
🛡️Security Type Systems
EP183: MCP vs API: what’s the difference?
blog.bytebytego.com·1d
🌐Network Protocols
🔁 Idempotency in System Design
dev.to·1d·
Discuss: DEV
📡Network Serialization