CBOR vs. the Other Guys
cborbook.com·4d·
Discuss: Hacker News
📋Protocol Buffers
Flag this post
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB
dev.to·1d·
Discuss: DEV
🔄Archival Workflows
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.com·1d
📝Concrete Syntax
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.com·2d
🔌Operating system internals
Flag this post
Dingo: A Meta-Language for Go
github.com·5h·
🦀Rust Macros
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
Agent design is still hard
simonwillison.net·6h
🔐Capability Systems
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·17h
🎫Kerberos Attacks
Flag this post
Integrations
theprogrammersparadox.blogspot.com·2d·
🔌Interface Evolution
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·14h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
Post-quantum vaults are live on Bitcoin Cash's Chipnet
blog.bitjson.com·14h·
Discuss: Hacker News
🔗Hash Chains
Flag this post
Type-safe `net/rpc` alternative with context support
reddit.com·10h·
Discuss: r/golang
gRPC
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·10h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
Building a Distributed Database in Elixir (Part 2: Architecture and the Beam)
medium.com·1d·
Discuss: Hacker News
🤝Distributed Consensus
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.com·2d·
🌐WebRTC Archives
Flag this post
Cross-referencing code and specs for maintainability (2024-03-21)
ueber.net·1d·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
AI Agent Security: Why Reliability Is the Missing Defense Against Data
composio.dev·1d·
Discuss: Hacker News
🛡️Error Boundaries
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.pro·1d·
Discuss: Hacker News
🛡️eBPF Programs
Flag this post