Feeds to Scour
SubscribedAll
Scoured 256045 posts in 6.43 s
The 3 a.m. Call That Changed The Way I Design APIs
thenewstack.ioยท2h
๐Ÿ’“PHI Accrual
Preview
Report Post
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge
dev.toยท5hยท
Discuss: DEV
๐Ÿ”’Rustls
Preview
Report Post
Live data with load balancing/hot stand-by/HA. How-To?
reddit.comยท10hยท
Discuss: r/homelab
๐ŸŽš๏ธTiered Storage
Preview
Report Post
Light-Weight Contexts: An OS Abstraction for Safety and Performance
usenix.orgยท1d
๐Ÿ”€Crossbeam
Preview
Report Post
Jailbreaks Peak Early, Then Drop: Layer Trajectories in Llama-3.1-70B
lesswrong.comยท8h
โšกLMAX Disruptor
Preview
Report Post
โ€˜My mission is doneโ€™: Popular crime vlogger Sir P says heโ€™s signing off
jamaicaobserver.comยท1d
โšกLMAX Disruptor
Preview
Report Post
Optimizing Bracha's Reliable Broadcast: Shaving Rounds off a 37-Year-Old Algorithm
blog.can.acยท2d
๐ŸคPaxos
Preview
Report Post
Arcan 0.7.1 โ€“ Minutes To Midnight
arcan-fe.comยท21hยท
๐Ÿ“žTauri IPC
Preview
Report Post
Ubuntu Manpage: systemd-nspawn - Spawn a command or OS in a light-weight container
manpages.ubuntu.comยท22h
๐ŸงLinux
Preview
Report Post
The Trust Shift: Secure Enclaves for Private Nostr Relays on nostr
damus.ioยท1d
๐Ÿ›ก๏ธIntel SGX
Preview
Report Post
How painful is your design-to-dev handoff? (2-min survey)
docs.google.comยท2dยท
Discuss: r/reactjs
๐ŸŽจDesign Systems
Preview
Report Post
ssh-agent broken in tmux? I've got you!
jmmv.devยท1d
๐Ÿ”’Futex
Preview
Report Post
Bypass Windows user interface privilege isolation via the CTF input method proto
projectzero.googleยท1dยท
Discuss: Hacker News
๐Ÿ“žTauri IPC
Preview
Report Post
Deconstructing a 45% Lead Conversion Win: How We Replaced Manual SQL Scripts with a Simple API
getmichaelai.comยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธError Handling
Preview
Report Post
All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core (CVE-2025-68664)
cyata.aiยท2dยท
Discuss: Hacker News
๐Ÿ”“Binary Exploitation
Preview
Report Post
On Delegation of Verifiable Presentations from mdoc and BBS Credentials
eprint.iacr.orgยท5d
๐Ÿ”Homomorphic Secret Sharing
Preview
Report Post
Rahsiโ„ข Signalโ€“Enforcement Boundary (SEBโ„ข) | Why Device Compliance Is a Signal and Conditional Access Is the Gate
aakashrahsi.onlineยท3dยท
Discuss: DEV
๐Ÿ”’Security
Preview
Report Post
Building a Heartbeat-style Gossip Node Network: Failure Detection in Distributed Systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ฌGossip Protocols
Preview
Report Post
Spearphishing Campaign Abuses npm Registry to Target U.S. and Allied Manufacturing and Healthcare Organizations
socket.devยท4d
๐Ÿ”“Binary Exploitation
Preview
Report Post
Getting started with OpenShift APIs for Data Protection
developers.redhat.comยท4d
๐Ÿ“‹etcd
Preview
Report Post