Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
πFormat Specification
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comΒ·13h
πHash Functions
Flag this post
Notes from RIPE 91
blog.apnic.netΒ·21h
πDNS over QUIC
Flag this post
IFS Fractal codec
codecs.multimedia.cxΒ·8h
πFractal Compression
Flag this post
Oops, My UUIDs Collided
π§ͺBinary Fuzzing
Flag this post
Text case changes the size of QR codes
johndcook.comΒ·4h
π±QR Archaeology
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comΒ·11h
π‘οΈeBPF Security
Flag this post
Error'd: Once Is Never Enough
thedailywtf.comΒ·13h
π§ͺHardware Fuzzing
Flag this post
Evaluating Learning Congestion control Schemes for LEO Constellations
arxiv.orgΒ·1d
π‘Network Calculus
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comΒ·20h
πDecompilation
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comΒ·5h
π‘οΈeBPF Security
Flag this post
How fast can an LLM go?
π―Emulator Accuracy
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comΒ·22h
π³Archive Merkle Trees
Flag this post
De Bruijn Numerals
Ξ»Lambda Encodings
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comΒ·1d
πBGP Security
Flag this post
Fully-Specified Algorithms for JOSE and COSE is now RFC 9864
self-issued.infoΒ·22h
πCryptographic Protocols
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comΒ·1d
πCombinatory Logic
Flag this post
Loading...Loading more...