Consistent hashing
eli.thegreenplace.netΒ·11hΒ·
Discuss: Hacker News
🌐Distributed Hash
AI-Powered Secure Cloud File Sharing
dev.toΒ·4hΒ·
Discuss: DEV
πŸŽ“Academic Torrents
Smash: Flexible, Fast, and Resource-Efficient Placement and Lookup of Distributed Storage
cacm.acm.orgΒ·3d
🌐IPFS
BitTorrent’s DHT and the Leading ISP Networks Helping to Keep it Alive
torrentfreak.comΒ·12hΒ·
Discuss: r/Piracy
🌊BitTorrent
Turning Billions of Strings into Integers Every Second Without Collisions
jazco.devΒ·2dΒ·
🌳Archive Merkle Trees
[THM] Gallery β€” Writeup
infosecwriteups.comΒ·11h
🌐WARC Forensics
The Case for Hybrid Cache for Object Stores
risingwave.comΒ·4hΒ·
⚑Redis Internals
storaged-project/udisks
github.comΒ·4h
❄️Nixpkgs
Cryptographic documents in RavenDB
ayende.comΒ·1d
βœ…Document Verification
Packing Multiple Services into One Rust Binary
carlriis.comΒ·1dΒ·
Discuss: Hacker News
πŸ”’Linear Types
Authboss is a modular authentication system for the web.
github.comΒ·6hΒ·
Discuss: r/golang
🌐WASI
How our small company migrated from Docker Swarm to Kubernetes
medium.comΒ·1d
πŸ“¦Container Security
1.5M PDFs in 25 Minutes
zerodha.techΒ·6hΒ·
Discuss: Hacker News
πŸ“„Document Digitization
CyberDanube Security Research 20250919-0 | Multiple Vulnerabilities in Novakon P series
seclists.orgΒ·2d
πŸ“¦Container Security
Pointer leaks through pointer-keyed data structures
googleprojectzero.blogspot.comΒ·1dΒ·
🌳Archive Merkle Trees
This Week in Security: Randomness is Hard, SNMP Shouldn’t Be Public, and GitHub Malware Delivery
hackaday.comΒ·1d
πŸ”“Hacking
Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers
wired.comΒ·12h
🌐Archive Topology
CBOR ε’Œ MsgPack ζ˜―δΈ€ε›žδΊ‹
blog.est.imΒ·12h
πŸ”CBOR
Monitoring AS-SETs and why they matter
blog.cloudflare.comΒ·1d
πŸ›£οΈBGP Hijacking
Consistent Hashing Explained: The Algorithm That Powers Modern Internet
javarevisited.substack.comΒ·3dΒ·
🀝Distributed Consensus