Guide: TLS and QUIC
moq.devยท1dยท
Discuss: Hacker News
๐ŸงฉMicroservices
Flag this post
The Hidden Ledger of Code: Tracking the Carbon Debt Inside Our Software
hackernoon.comยท19h
๐Ÿ“ŠPerformance Profiling
Flag this post
How are you handling identities for AI agents?
news.ycombinator.comยท19hยท
Discuss: Hacker News
๐ŸŒDistributed systems
Flag this post
Mitre ATT&CK v18 released
medium.comยท6hยท
Discuss: Hacker News
๐Ÿ—ƒ๏ธDatabase Internals
Flag this post
Why should I accept all cookies?
idiallo.comยท9hยท
Discuss: Hacker News
๐ŸนApache Arrow
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท3dยท
Discuss: Hacker News
๐Ÿ“Formal Methods
Flag this post
Oops, My UUIDs Collided
alexsci.comยท1dยท
Discuss: Hacker News
๐ŸนApache Arrow
Flag this post
DDD and the Simplicity Gospel
oluatte.comยท11hยท
๐ŸŒDistributed systems
Flag this post
Show HN: KeyLeak Detector โ€“ Scan websites for exposed API keys and secrets
github.comยท11hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.mediaยท1dยท
Discuss: Hacker News
๐Ÿ’นRust Finance
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.comยท21hยท
Discuss: Hacker News
๐Ÿ—ƒ๏ธDatabase Internals
Flag this post
Web PKI Ditches TLS Client Authentication
feistyduck.comยท2dยท
Discuss: Hacker News
๐Ÿ“Formal Methods
Flag this post
Becoming the Internet: Weighing the Options
blog.bsprague.comยท7hยท
Discuss: Hacker News
๐Ÿ“ฎMessage Queues
Flag this post
BYOD security solutions explained
proton.meยท1dยท
Discuss: Hacker News
๐Ÿ“ŠSystems Monitoring
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท1dยท
Discuss: Hacker News
๐ŸŒDistributed systems
Flag this post
Moving tables across PostgreSQL instances
ananthakumaran.inยท4hยท
Discuss: Hacker News
๐Ÿ“ŠApache Parquet
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techยท10hยท
๐Ÿ’ปProgramming languages
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comยท2dยท
Discuss: Substack
๐Ÿ“ฆData Serialization
Flag this post
From Visibility to Verification: The Second Phase of AI Surface Governance
aivojournal.orgยท1dยท
Discuss: Hacker News
๐Ÿ“ŠSystems Monitoring
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.comยท1dยท
Discuss: Hacker News
๐ŸŒDistributed systems
Flag this post