Devlog: Godot Game - A Trigger That Reveals Secrets
lmika.org·9h
🎯Proof Tactics
103: We Can’t Trust
mwl.io·2d
💾Persistence Strategies
The AirPods 4 and Lego’s brick-ified Grogu are our favorite deals this week
theverge.com·19h
🗜️LZW Variants
Three gripes about Go modules
jotaen.net·1d·
Discuss: Hacker News
🔓Reverse engineering
Salesforce data breach: what you need to know
fortra.com·3d
🎫Kerberos Attacks
Roll your own bot detection: fingerprinting/JavaScript
blog.castle.io·4d·
Discuss: Hacker News
🔗Binary Similarity
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·2d·
Discuss: Hacker News
🌊Stream Processing
[R] DeepSeek 3.2's sparse attention mechanism
reddit.com·2d·
🌀Brotli Internals
Oracle Clop Data Theft Campaign Started Months Ago
decipher.sc·2d
🔓Hacking
Rust is a low-level systems language (not!)
reddit.com·5h·
Discuss: r/rust
🦀Rust Macros
US investors take over spyware manufacturer NSO Group
heise.de·15h
🔓Open Source Software
I created and open sourced an LLM and backend orchestration system
reddit.com·2d·
Discuss: r/golang
🌀Brotli Internals
Agent Diary: Oct 10, 2025 - The Great Merge Convergence: When Five Days of Work Finally Shake Hands
dev.to·2d·
Discuss: DEV
🔄Language Evolution
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·5d·
Discuss: Hacker News
🛡️eBPF Security
QUIC! Jump to User Space!
hackaday.com·1d
🌐Network Protocols
Community: The 100% Open-Source AI Stack That Automates My Business, and Tricks for Troubleshooting It
dev.to·3d·
Discuss: DEV
🏠Homelab Orchestration
Red Hat hackers Crimson Collective are now going after AWS instances
techradar.com·2d
🚀Indie Hacking
Human rights groups demand answers from Microsoft on its role in Israel’s war on Gaza
accessnow.org·2d
🔍NTLM Forensics