Protect your keys with the Secure Enclave
octet-stream.netΒ·7hΒ·
🌐NetworkProtocols
7 Essential Distributed Systems Techniques Every Software Architect Must Master in 2024
dev.toΒ·5hΒ·
Discuss: DEV
πŸ€–Network Automation
UniPwn: Unitree Humanoid Robot BLE Service Command Injection Analysis
github.comΒ·2hΒ·
Discuss: Hacker News
πŸ”’WASM Capabilities
MCP Tools: Attack Vectors and Defense Recommendations for Autonomous Agents
elastic.coΒ·1d
πŸ§ͺProtocol Fuzzing
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.orgΒ·2dΒ·
Discuss: Hacker News
πŸ”Capability Systems
Some Notes I Took on Software Architecture
lautarolobo.xyzΒ·1dΒ·
πŸ’ΎPersistence Strategies
What is the best hardware to use for OPNsense?
reddit.comΒ·4hΒ·
Discuss: r/homelab
πŸ“»Homebrew Protocols
Intuitions Behind the Range Proofs of Bulletproof
cryptologie.netΒ·1d
🎯Proof Tactics
iOS 26 Security & Privacy Features Explained: Essential Insights for Developers and Users
nowsecure.comΒ·1d
πŸ›‘οΈARM TrustZone
What is Zero-Knowledge Proof: Complete Guide to ZKPs, zk-SNARKs, and zk-STARKs
dev.toΒ·12hΒ·
Discuss: DEV
πŸ”Quantum Security
My Journey to OSCP/OSCP+ exam
infosecwriteups.comΒ·1d
πŸ•΅οΈPenetration Testing
InfoSec News Nuggets 9/19/2025
aboutdfir.comΒ·1d
πŸ”“Hacking
The Anatomy of an SSH Config
chuck.isΒ·4d
πŸ“¦Container Security
Computer Networking: A Top-Down Approach (9th Edition)
pearson.comΒ·1dΒ·
Discuss: Hacker News
πŸ“‘Network Protocol Design
Reimagining MCP via gRPC
medium.comΒ·2dΒ·
⚑gRPC
Object Orientation [2013 !]
jackrusher.comΒ·3hΒ·
Discuss: Hacker News
🌳Persistent Data Structures
Worth Reading 091925
rule11.techΒ·1d
πŸ•ΈοΈMesh Networking
Ap2 Protocol Documentation
ap2-protocol.netΒ·2dΒ·
Discuss: Hacker News
🏺Protocol Archaeology
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
portswigger.netΒ·3d
πŸ§ͺProtocol Fuzzing