Reading List 11/22/25
construction-physics.comยท21h
๐ก๏ธPreservation Physics
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.comยท1d
๐ Homelab Security
Flag this post
Olmo 3 is a fully open LLM
simonwillison.netยท10h
๐Brotli Internals
Flag this post
rpki-client seeks โฌ300K in funding by 2026 to sustain development
discoverbsd.comยท2d
๐Operating system internals
Flag this post
Building a Serverless Ad Tracker: Scaling to Events and Back
๐๏ธObservatory Systems
Flag this post
Disparity-in-Differences: Extracting Hierarchical Backbones of Weighted Directed Networks
arxiv.orgยท2d
๐Graph Isomorphism
Flag this post
Overloading the Node: The Hidden Engineering Behind Scalable Blockchain Workflows
๐คDistributed Consensus
Flag this post
P2A Security & Governance: Building Enterprise-Ready Guardrails for AWS Process-to-Agentic Systems
๐ณArchive Merkle Trees
Flag this post
Hyperscalers Are Hard
๐Streaming Systems
Flag this post
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
aws.amazon.comยท1d
๐ณArchive Merkle Trees
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Cryptographic Archaeology
Flag this post
Web2.5: The Essential Bridge Every Successful DApp Is Still Crossing in 2025
๐คDistributed Consensus
Flag this post
Loading...Loading more...