VPN Protocol, Cryptographic Networking, Kernel Modules, Secure Tunneling

How I Used WireGuard to Secure API Communication Between Cloud Servers
dev.to·3d·
Discuss: DEV
QUIC Protocol
Flag this post
A Practical Guide to Transitioning to Memory-Safe Languages
queue.acm.org·9h·
🛡️Memory Safety
Flag this post
Tiny Plaintext-based Password Manager
reddit.com·1d·
Discuss: r/rust
🦅Falco
Flag this post
How I Used WireGuard to Secure API Communication Between Cloud Servers — Plus a PyAirbyte Custom Connector Tutorial
dev.to·2d·
Discuss: DEV
📬MessagePack
Flag this post
Channel-Robust RFF for Low-Latency 5G Device Identification in SIMO Scenarios
arxiv.org·11h
🎯BPF CO-RE
Flag this post
How to Keep PII Out of OpenTelemetry
oneuptime.com·1h·
Discuss: Hacker News
🔭OpenTelemetry
Flag this post
Ubuntu Server Security Suggestions
documentation.ubuntu.com·1d·
Discuss: Hacker News
🐧Linux
Flag this post
The Plain Text Manifesto
plaintextmanifesto.eu·5h·
Discuss: Hacker News
🔒Digital Privacy
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers
bastille.net·23h
🌐Network Security
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.net·9h·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
Building Your Own VPC on Linux: A DevOps Love Story 💘🐧
dev.to·20h·
Discuss: DEV
🔍eBPF
Flag this post
When Reverse Proxies Surprise You: Hard Lessons from Operating at Scale
infoq.com·2h·
Discuss: Hacker News
☁️Cloudflare Workers
Flag this post
Liquid Auth: Decentralized, passwordless Web3 authentication
algorand.co·1d·
Discuss: Hacker News
🔗ActivityPub
Flag this post
Veilid: Distributed Decentralized Framework (From CultoftheDeadCow)
veilid.com·23h·
Discuss: Hacker News
📡MQTT
Flag this post
Exhaustive profiling toolkit: elfutils and libdwfl_stacktrace
developers.redhat.com·1d
📊Profiling Tools
Flag this post
Starting a 5-part “Write an API Gateway in Go from Scratch” series — looking for suggestions & feedback!
reddit.com·5h·
Discuss: r/golang
🌐Network Protocols
Flag this post
Seeing Inside the Vortex: Detecting Living off the Land Techniques
blogs.cisco.com·2d
🌐Network Security
Flag this post
remu.ii: Building the Ghost Before the Body
github.com·1d·
Discuss: DEV
🖥️Emulation
Flag this post
Show HN: AI-built tools with security by default
news.ycombinator.com·14m·
Discuss: Hacker News
🛡️AI Security
Flag this post
Protecting Privacy with Tails Linux
lwn.net·2d·
Discuss: Hacker News
🐧Linux
Flag this post