Sorting encrypted data without decryption: a practical trick
dev.toยท4hยท
Discuss: DEV
๐Ÿ”Hash Functions
An enough week
blog.mitrichev.chยท23hยท
๐Ÿ“ˆLinear programming
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท15h
๐Ÿ“Compression Bounds
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท5hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Three ways formally verified code can go wrong in practice
buttondown.comยท2h
๐Ÿ“œProof Carrying Code
Michael Kohn - tin can phone modem
mikekohn.netยท2h
๐ŸงชCassette Hacks
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท6h
๐Ÿ›กCybersecurity
Basketball trivia, editing distances, and derangement
leancrew.comยท1d
๐ŸŒณTrie Structures
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
QUIC! Jump to User Space!
hackaday.comยท3h
๐ŸŒNetwork Protocols
The silent impersonators: how lookalike domains threaten UK business trust
techradar.comยท4h
๐ŸŒDNS Security
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.comยท41mยท
๐Ÿ› ๏ธGreaseweazle
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.comยท12h
๐Ÿ“ผTape Simulation
SSH Security: Why You Should Touch to Verify
ubicloud.comยท11hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท19hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท9h
๐Ÿ”—Hash Chains
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท5hยท
Discuss: Hacker News
๐Ÿ”—Lisp
Preventing Internet Route Hijack with SIDRops Technology
ietf.orgยท2d
๐Ÿ›ฃ๏ธBGP Hijacking