The Constrained Application Protocol (CoAP)
datatracker.ietf.org·2d·
Discuss: Hacker News
📋Protocol Design
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.org·1d
📦Protocol Buffers
Flag this post
Credentials Evidence or Simulate
preludes.eu·2d·
Discuss: Hacker News
🔒Security
Flag this post
Switching from GPG to Age
luke.hsiao.dev·3h·
Discuss: Hacker News
🔒Security
Flag this post
Fourier Transforms
continuummechanics.org·3h·
Discuss: Hacker News
📡Signal Processing
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography in Cross-Silo Model Aggregation
dev.to·1d·
Discuss: DEV
🔢Homomorphic Encryption
Flag this post
Everything You Need to Know to Start Your Way as a Programmer
dev.to·2h·
Discuss: DEV
🌳Data Structures
Flag this post
Microsoft just updated code signing rules for #msdyn365BC
learn.microsoft.com·19h·
Discuss: DEV
🔒Security
Flag this post
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
dev.to·2d·
Discuss: DEV
🤝Paxos
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.com·2d
🔒Security
Flag this post
Show HN: Anonymous Peer to Peer Therapy
apps.apple.com·15h·
Discuss: Hacker News
📹WebRTC
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·1d
🔢Homomorphic Encryption
Flag this post
Human friendly industrial device IDs
bec-systems.com·19h·
Discuss: Hacker News
🔒Security
Flag this post
Where do I even begin with system design, where do I even start ?
reddit.com·4h·
Discuss: r/node
🏗️System Design
Flag this post
Show HN: JermCAD – A YAML-powered, vibe-coded, browser-based CAD software
github.com·5h·
Discuss: Hacker News
🎨Computer Graphics
Flag this post
How to get a character from a codepoint in Spark SQL
prequel.co·1d·
Discuss: Hacker News
🐛Fuzzing
Flag this post
Topographical sparse mapping: A training framework for deep learning models
sciencedirect.com·23h·
Discuss: Hacker News
👁️Computer Vision
Flag this post
Digital Resistance
rodgercuddington.substack.com·4h·
Discuss: Substack
🔒Digital Privacy
Flag this post
A Soft‑Fork Proposal for Blockchain‑Based Distributed AI Computation
hackernoon.com·2d
⛓️Blockchain
Flag this post
Reverse Engineering Googles BotGuard
github.com·2d·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post