MCP standard
dev.toยท4hยท
Discuss: DEV
๐ŸบProtocol Archaeology
Flag this post
Fully-Specified Algorithms for JOSE and COSE is now RFC 9864
self-issued.infoยท2d
๐ŸŒNetworkProtocols
Flag this post
Reflections on Trusting Trust (1984)
web.archive.orgยท5hยท
Discuss: Hacker News
๐Ÿ“œProof Carrying Code
Flag this post
Implementing MQTT 5 in Go : a deep dive into client design ( Part I )
reddit.comยท4hยท
Discuss: r/golang
๐Ÿ“‹Format Specification
Flag this post
Notes from RIPE 91
blog.apnic.netยท2d
๐ŸŒDNS over QUIC
Flag this post
What to know about the 4 suspects in the Louvre crown jewels heist
the-independent.comยท4h
๐Ÿ”Tape Forensics
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท2d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Handbook of Satisfiability (2021)
iospress.comยท9hยท
Discuss: Hacker News
๐Ÿ”—Combinatory Logic
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comยท2dยท
Discuss: Substack
๐ŸŒNetworkProtocols
Flag this post
Security Affairs newsletter Round 548 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท8h
๐Ÿ›กCybersecurity
Flag this post
Loro Protocol: a wire protocol designed for real-time CRDT sync
loro.devยท1dยท
Discuss: Hacker News
๐ŸŒWebSocket Framing
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท2d
๐Ÿ›ก๏ธeBPF Security
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techยท21hยท
๐Ÿ”ŒInterface Evolution
Flag this post
Part 2: Building MCP Servers to Control a Home Coffee Roaster - An Agentic Development Journey with Warp Agent
dev.toยท6hยท
Discuss: DEV
๐Ÿ HomeLab
Flag this post
Thinking with Types: type-level programming in Haskell
thinkingwithtypes.comยท5hยท
Discuss: Hacker News
๐Ÿ” Type-Level Programming
Flag this post
HardenedBSD October 2025 status update
discoverbsd.comยท11h
๐Ÿ”ŒOperating system internals
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.comยท4hยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
Flag this post
This Unbreakable CIA Cipher Fooled the World for 37 Years. Then Two People Accidentally Solved It.
popularmechanics.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
HydraPWK2 Is a Linux Distribution That Simplifies Pentesting
thenewstack.ioยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท2d
๐Ÿ”’Language-based security
Flag this post