The Why of PGP Authentication
articles.59.caยท16h
๐Ÿ”‘Cryptographic Protocols
Open Lineage
usenix.orgยท1d
๐Ÿ”ŒInterface Evolution
English - the hottest programming language of the future
dev.toยท12hยท
Discuss: DEV
๐Ÿ”„Language Evolution
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท15hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
RondoDox Botnet targets 56 flaws across 30+ device types worldwide
securityaffairs.comยท22h
๐Ÿ Homelab Pentesting
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท18h
๐Ÿ”“Hacking
Getting a Hypergraph of Functions to a Browser
systeminit.comยท1dยท
Discuss: Hacker News
๐Ÿ“E-graphs
Understanding conflict resolution and avoidance in PostgreSQL: a complete guide
pgedge.comยท9hยท
Discuss: r/programming
๐Ÿ›ก๏ธByzantine Fault Tolerance
Writing a risk scenario
medium.comยท2d
๐Ÿ”CBOR
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.ioยท14hยท
๐Ÿ”“Open Source Software
JVM stack is about to be massively modernized
medium.comยท12hยท
Discuss: Hacker News
๐Ÿ”—Dependency Resolution
Python 3.12.12, 3.11.14, 3.10.19 and 3.9.24 are now available!
pythoninsider.blogspot.comยท1d
๐Ÿ”Z3 Parsing
go-async, a type-Safe, retryable, and deterministic concurrency for Go
reddit.comยท21hยท
Discuss: r/golang
๐Ÿฆ€Rust Borrowing
Item Patterns and Struct Await
noratrieb.devยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท2dยท
๐Ÿ”‘Cryptographic Protocols
The effective LLM multi-tenant security with SQL
getbruin.comยท1dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Running new applications on old glibc
lightofdawn.orgยท1dยท
Discuss: Hacker News
๐Ÿ”—Static Linking
LINQ and Learning to Be Declarative
nickstambaugh.devยท1dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
A small number of samples can poison LLMs of any size
anthropic.comยท1dยท
๐Ÿ”Vector Forensics