Zero Trust in Reverse: Why the Definition of Zero Trust Is Only Half Full
threatresearch.ext.hp.com·22h·
Discuss: Hacker News
🌐Distributed systems
A Timeline of Public Key Infrastructure: What Worked, What Failed, and What’s Next
hackernoon.com·2d
🌐Distributed systems
Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night
securityboulevard.com·8h·
Discuss: Hacker News
📐Formal Methods
Building a shared world with systems we don't understand–what could go wrong?
syntheticauth.ai·5h·
Discuss: Hacker News
🌐Distributed systems
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.com·5h·
Discuss: Hacker News
💻Programming languages
Shamir's Secret Sharing
en.wikipedia.org·1d·
Discuss: Hacker News
📏Linear Types
The Supply Chain Is the New Watering Hole
material.security·1d·
Discuss: Hacker News
🌊Stream Processing
Show HN: SARE, a Hybrid Quantum-Safe Encryption System Implemented in Rust
github.com·5h·
Discuss: Hacker News
📏Linear Types
Which OAuth Flow Should You Use?
nimblesa.com·1d·
Discuss: Hacker News
📦Data Serialization
You Already Have Our Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
labs.watchtowr.com·1d·
Discuss: Hacker News
🏹Apache Arrow
Lessons in Disabling RC4 in Active Directory
syfuhs.net·5h·
Discuss: Hacker News
🏹Apache Arrow
Exploring Canton: a privacy-preserving distributed ledger for finance
quant.engineering·20h·
Discuss: Hacker News
🌐Distributed systems
Why Todays Identity and Access Management Can't Survive the AI Age
identityfusion.com·16h·
Discuss: Hacker News
🌐Distributed systems
Supply chains and watering holes
cryptography.dog·1d·
Discuss: Lobsters
🌐Distributed systems
Stop trusting your employees. Uber's "God View" proves you can't
cerbos.dev·6h·
Discuss: Hacker News
📊Systems Monitoring
Zero-knowledge proofs unlock privacy in digital identity
hopae.com·3d·
Discuss: Hacker News
🌐Edge Computing
Securing MCP Servers
corgea.com·3d·
Discuss: Hacker News
📮Message Queues
Preventing the NPM Debug/Chalk Compromise in 200 lines of JavaScript
getvouchsafe.org·16h·
📦Data Serialization
A Short Introduction to Tor
spec.torproject.org·2d·
Discuss: Hacker News
📏Linear Types
Coco – Solving the Expression Problem in Standard OO (Java, C#, Scala, ..)
drops.dagstuhl.de·7h·
Discuss: Hacker News
💻Programming languages