Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
dev.to·9h·
Discuss: DEV
📋Format Specification
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·20h
🔐Hash Functions
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·8h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐DNS over QUIC
Flag this post
IFS Fractal codec
codecs.multimedia.cx·15h
🌀Fractal Compression
Flag this post
Oops, My UUIDs Collided
alexsci.com·8h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Text case changes the size of QR codes
johndcook.com·11h
📱QR Archaeology
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·18h
🛡️eBPF Security
Flag this post
Error'd: Once Is Never Enough
thedailywtf.com·20h
🧪Hardware Fuzzing
Flag this post
Evaluating Learning Congestion control Schemes for LEO Constellations
arxiv.org·1d
📡Network Calculus
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·1d
🔓Decompilation
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·12h
🛡️eBPF Security
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·7h
🔓Hacking
Flag this post
Build reliable AI systems with Automated Reasoning on Amazon Bedrock – Part 1
aws.amazon.com·5h
Proof Automation
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.com·1d·
Discuss: Substack
🌐NetworkProtocols
Flag this post
How fast can an LLM go?
fergusfinn.com·1d·
Discuss: Hacker News
🎯Emulator Accuracy
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·1d
🌳Archive Merkle Trees
Flag this post
De Bruijn Numerals
text.marvinborner.de·1d·
Discuss: Hacker News
λLambda Encodings
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·1d
🌐BGP Security
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·8h·
Discuss: Hacker News
🔗Network Calculi
Flag this post