Serialization Security, Binary Protocols, Data Interchange, Schema Validation

Ransomware attack at blood center: Org tells users their data’s been stolen
malwarebytes.comยท1d
๐Ÿ”“Hacking
GHC Developer Blog: GHC 9.10.3 is now available
haskell.orgยท2d
๐Ÿ”—Functional Compilers
Converting JWKS JSON to PEM using Python
akrabat.comยท2d
๐Ÿ“ABNF Parsing
Urlref: Website Bookmarking for Handwritten Notes
benjaminhollon.comยท15hยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
Rackintosh Plus
identity4.comยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธVintage Macintosh
Rewriting Val Town's editor
blog.val.townยท3dยท
๐ŸŽฏGradual Typing
Improving state machine code generation
trifectatech.orgยท3dยท
๐Ÿš€Compiler Optimizations
What Happened to Google's A2A?
blog.fka.devยท16hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Enhancing 6G Network Security and Incident Response through Integrated VNF and SDN Technologies
arxiv.orgยท20h
๐Ÿ•ธ๏ธMesh Networking
Tokenizing Loops of Antibodies
arxiv.orgยท20h
๐ŸŽฏAutomata theory
Oops, No Victims: The Largest Supply Chain Attack Stole 5 Cents
securityalliance.orgยท3dยท
Discuss: Hacker News
๐ŸบKerberos Archaeology
Proven & Stable: USA/UK Gmail Accounts - Perfect for Business.
dev.toยท14hยท
Discuss: DEV
๐Ÿ Personal Archives
[P] Semlib: LLM-powered Data Processing
reddit.comยท8hยท
๐ŸŒ€Brotli Internals
Notes from PyData Berlin 2025
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Learning
reddit.comยท5hยท
Discuss: r/golang
๐Ÿง Lisp Dialects
Mastering Python: Beyond Syntax into Strategy
dev.toยท5hยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
The Proactive Agent: Slack and Symfony for Real-Time Communications
dev.toยท2dยท
Discuss: DEV
โšกgRPC
Pydantic AI Gateway
github.comยท15hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Automated Vulnerability Prioritization via Semantic Similarity & Code Attribution Graph Analysis
dev.toยท2dยท
Discuss: DEV
๐Ÿ“Code Metrics