Modern Protocols, Encrypted DNS, Performance Optimization, Network Evolution

Feeds to Scour
SubscribedAll
Scoured 16052 posts in 200.3 ms
DNS is the most powerful tool in your home lab
xda-developers.com·2d
🌐DNS Security
Preview
Report Post
Building a Claude Traffic Proxy in One Session
dev.to·9h·
Discuss: DEV
🌐NetworkProtocols
Preview
Report Post
CPNs, LLMs, and Distributed Applications
blog.sao.dev·4h·
Discuss: Hacker News
🌊Stream Processing
Preview
Report Post
Understanding Partial Reachability in the Internet Core
arxiv.org·3d
📡BGP Archaeology
Preview
Report Post
Policy-Based Routing on an OpenWrt Router
dariusz.wieckiewicz.org·2h·
Discuss: Hacker News
🛡️eBPF Security
Preview
Report Post
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
securityaffairs.com·13h
🔓Hacking
Preview
Report Post
The Excruciating Slow Rise of DNSSEC: A Dialogue With Roy Arends About Myths, Realities and Hard Lessons
circleid.com·2d
🌐DNS Security
Preview
Report Post
Pangolin 1.15 Tunneled Reverse Proxy Launches iOS and Android Apps
linuxiac.com·1d
🛡️ARM TrustZone
Preview
Report Post
instantsc/SimpleDnsCrypt: A simple management tool for dnscrypt-proxy
github.com·5d
🌐DNS Security
Preview
Report Post
Malicious PyPI Packages Spellcheckpy and Spellcheckerpy Deliver Python Rat
aikido.dev·12h·
Discuss: Hacker News
🧪Binary Fuzzing
Preview
Report Post
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025
synacktiv.com·1d
💾Memory Mapping
Preview
Report Post
DNS Record Types Explained
dev.to·1d·
Discuss: DEV
📡DNS Archaeology
Preview
Report Post
A public and free DNS service for a better security and privacy
quad9.net·6d
🌐DNS Security
Preview
Report Post
DNS OverDoS: Are Private Endpoints Too Private?
unit42.paloaltonetworks.com·4d
🌐DNS Security
Preview
Report Post
AdGuard goes open-source with its custom VPN protocol that can mimic web traffic
techradar.com
·1d
📞WebRTC
Preview
Report Post
Exposing Privileged Ports with Podman (2024)
blog.jdboyd.net·1d·
Discuss: Hacker News
📦Container Security
Preview
Report Post
Exploring common centralized and decentralized approaches to secrets management
aws.amazon.com·1d
🌳Archive Merkle Trees
Preview
Report Post
Stealing AI Models Through the API: A Practical Model Extraction Attack
praetorian.com·1d
🔍Vector Forensics
Preview
Report Post
Hosting a Static Site in the Silliest Way Possible (Part 2)
geoff.tuxpup.com·1d
🧱Immutable Infrastructure
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help