Arti 1.6.0 released: Circuit padding, side-channel attack mitigations, OpenTelemetry, and more.
blog.torproject.orgยท1d
๐Ÿ”’Linear Types
Meet the Flummoxagon
n-e-r-v-o-u-s.comยท8hยท
Discuss: Hacker News
๐Ÿ“Mathematical Art
The Mondrian introduction to functional optics
marcosh.github.ioยท12hยท
Discuss: Hacker News
โŸทBidirectional Programming
Sources of Power in Organizations
leadingsapiens.comยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Security
WireGuard topologies for self-hosting at home
garrido.ioยท4dยท
๐Ÿ“กNetwork Protocol Design
Beyond the Single-Writer Limitation with Turso's Concurrent Writes
turso.techยท1dยท
๐Ÿ“SQLite WAL
Zero Standing Privilege: Marginal Improvement on the Wrong Paradigm
gluufederation.medium.comยท1hยท
Discuss: Hacker News
๐Ÿ”Capability Security
Making performant Python bindings to compiled code
kylebarron.devยท7hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
DIY infrastructure is what's causing you to fail
tower.devยท10hยท
Discuss: Hacker News
๐Ÿ Homelab Orchestration
Hayashi โ€“ Architecture Boundary Diagrams as Code
github.comยท1dยท
Discuss: Hacker News
โšกgRPC
The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next
rapid7.comยท9h
๐ŸŽฏThreat Hunting
Show HN: Horcrux: Split files into encrypted fragments for Node and React Native
github.comยท15hยท
Discuss: Hacker News
๐Ÿ”’Homomorphic Compression
Latency vs. Accuracy for LLM Apps โ€” How to Choose and How a Memory Layer Lets You Win Both
dev.toยท10hยท
Discuss: DEV
โšกPerformance Mythology
Learning to Route: A Rule-Driven Agent Framework for Hybrid-Source Retrieval-Augmented Generation
arxiv.orgยท1d
๐Ÿ”Information Retrieval
Transductive and Learning-Augmented Online Regression
arxiv.orgยท18h
๐Ÿ”Information Retrieval
Forking-Sequences
arxiv.orgยท18h
๐ŸŒธBloom Variants
Why We Created Turso, a Rust-Based Rewrite of SQLite
thenewstack.ioยท1dยท
Discuss: Hacker News
๐Ÿ’พSQLite
Tinfoil Chat โ€“ Onion-routed, endpoint secure messaging system
github.comยท3dยท
Discuss: Hacker News
๐ŸŒŠStream Ciphers
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.comยท5d
๐ŸŒณArchive Merkle Trees