The Why of PGP Authentication
articles.59.caยท16h
๐ŸŒณArchive Merkle Trees
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท2dยท
๐ŸŒNetworkProtocols
Experimenting with ACL2 and Claude Code
mikedodds.orgยท16hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
SSH Security: Why You Should Touch to Verify
ubicloud.comยท21hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.comยท4d
๐Ÿ”Quantum Security
SIEM vs SOAR: The Key Differences for Modern Security Teams
securityscorecard.comยท13h
๐ŸšจIncident Response
Announcing coreboot 25.09 release
blogs.coreboot.orgยท5h
๐Ÿ”ŒOperating system internals
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท17h
๐Ÿ Homelab Federation
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท15hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Building A Real-Time Communication System Using Go and WebSocket
dev.toยท9hยท
Discuss: DEV
๐ŸŒWebSocket Framing
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Wireshark 4.6: New functions for encrypted data
heise.deยท18h
๐Ÿ•ต๏ธNetwork Forensics
When AI Remembers Too Much โ€“ Persistent Behaviors in Agentsโ€™ Memory
unit42.paloaltonetworks.comยท1d
๐Ÿ”ฒCellular Automata
From Toil to Empowerment: Building Self-Service Ingress with GitOps
usenix.orgยท1d
๐Ÿ•ธ๏ธMesh Networking
APRS over LoRa with RNode | unsigned.io
unsigned.ioยท18h
๐Ÿ“ปHomebrew Protocols
HTTP/3: The Next Evolution of Web Protocols
corero.comยท3d
๐ŸŒNetwork Protocols
Nov 15 2025 : Intro to Soldering Workshop: Make an LED Tile
nycresistor.comยท3h
โš™๏ธDIY Electronics
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท16h
๐Ÿ›กCybersecurity
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security