Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
dev.toΒ·2hΒ·
Discuss: DEV
πŸ“‹Format Specification
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comΒ·13h
πŸ”Hash Functions
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netΒ·1hΒ·
Discuss: Hacker News
πŸ›£οΈBGP Hijacking
Flag this post
Notes from RIPE 91
blog.apnic.netΒ·21h
🌐DNS over QUIC
Flag this post
IFS Fractal codec
codecs.multimedia.cxΒ·8h
πŸŒ€Fractal Compression
Flag this post
Oops, My UUIDs Collided
alexsci.comΒ·1hΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Flag this post
Text case changes the size of QR codes
johndcook.comΒ·4h
πŸ“±QR Archaeology
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comΒ·11h
πŸ›‘οΈeBPF Security
Flag this post
Error'd: Once Is Never Enough
thedailywtf.comΒ·13h
πŸ§ͺHardware Fuzzing
Flag this post
Evaluating Learning Congestion control Schemes for LEO Constellations
arxiv.orgΒ·1d
πŸ“‘Network Calculus
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comΒ·20h
πŸ”“Decompilation
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comΒ·5h
πŸ›‘οΈeBPF Security
Flag this post
How fast can an LLM go?
fergusfinn.comΒ·1dΒ·
Discuss: Hacker News
🎯Emulator Accuracy
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comΒ·22hΒ·
Discuss: Substack
🌐NetworkProtocols
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comΒ·22h
🌳Archive Merkle Trees
Flag this post
De Bruijn Numerals
text.marvinborner.deΒ·1dΒ·
Discuss: Hacker News
Ξ»Lambda Encodings
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comΒ·1d
🌐BGP Security
Flag this post
Minimal Sufficiency: A Principle β€˜Similar’ to End-to-End
cacm.acm.orgΒ·1hΒ·
Discuss: Hacker News
πŸ”—Network Calculi
Flag this post
Fully-Specified Algorithms for JOSE and COSE is now RFC 9864
self-issued.infoΒ·22h
πŸ”‘Cryptographic Protocols
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comΒ·1d
πŸ”—Combinatory Logic
Flag this post