VPN Protocol, Cryptographic Networking, Kernel Modules, Secure Tunneling

Building an Automated SAST + DAST Pipeline: Solving One of the Biggest Security Problems in Modern…
blog.devops.dev·4h
🔎Quickwit
Flag this post
Xen and XCP-ng on Ampere Altra: ARM Demo at KubeCon
xcp-ng.org·20h·
Discuss: Hacker News
🚀XDP
Flag this post
Every Intel GPU runs on a Raspberry Pi
youtube.com·1d
Hardware Acceleration
Flag this post
Announcing HAProxy Unified Gateway (beta)
haproxy.com·3d·
Discuss: Hacker News
🐝Cilium
Flag this post
How to Design a Scalable Architecture for Cloud Applications
acecloud.ai·2d·
Discuss: DEV
🏗️System Design
Flag this post
Show HN: Martillo – an open source Raycast alternative (Hammerspoon, lazy.nvim)
github.com·9h·
Discuss: Hacker News
🚀Shuttle
Flag this post
Models, Agents and Prompt Injections – Some Experiments
veganmosfet.github.io·2d·
Discuss: Hacker News
🔌gRPC
Flag this post
From Browsers to Distributed Compute: How Neurolov’s NLOV Token Enables Decentralized AI Infrastructure
dev.to·2h·
Discuss: DEV
⛓️Blockchain
Flag this post
New Features for Better State Control in WebForms Core 2
dev.to·1d·
Discuss: DEV
💼Thrift
Flag this post
Whisper Leak side-channel attack bad actors access sensitive LLM conversations
scworld.com·1d·
Discuss: Hacker News
🛡️AI Security
Flag this post
Daily Tech News Roundup - 2025-11-14
dev.to·10h·
Discuss: DEV
📡RSS
Flag this post
VPC creation on Linux
dev.to·1d·
Discuss: DEV
🔍eBPF
Flag this post
Efficient Hyperdimensional Computing with Modular Composite Representations
arxiv.org·10h
🧮Vector Databases
Flag this post
Automated Penetration Testing, Reimagined: How ZeroThreat Cuts Manual Security Work by 90%
dev.to·2d·
Discuss: DEV
🧵Loom
Flag this post
Lorxus Does Halfhaven: 11/08~11/14
lesswrong.com·2h
🦗Pest
Flag this post
Learning-Based Channel Access in Wi-Fi: A Multi-Armed Bandit Approach
arxiv.org·10h
📊Information Theory
Flag this post
Dancing in the Clouds: Moving Dancer2 Apps from a VPS to Cloud Run
dev.to·22h·
Discuss: DEV
🚀Shuttle
Flag this post
MongoDB Drivers and Network Compression
dev.to·23h·
Discuss: DEV
🐅WiredTiger
Flag this post
What security frameworks are essential for protecting P2P trading users?
dev.to·1d·
Discuss: DEV
🔒Security
Flag this post
HackGPT Enterprise, AI-Powered Penetration Testing Platform
github.com·2d·
Discuss: Hacker News
📨NATS
Flag this post