Show HN: Data Encoding for Human Input
github.comยท5hยท
Discuss: Hacker News
๐Ÿ”คCharacter Encoding
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.ukยท18h
๐Ÿ’ฟFLAC Archaeology
The Collision Protocol: When Two Keys Share a Drawer
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Hash Functions
Edge cases in DNSSEC validation with multiple algorithms
blog.apnic.netยท13h
๐ŸŒDNS Security
The Dark Art of Financial Disguise in Web3: Money Laundering Schemes and Countermeasures
arxiv.orgยท11h
๐Ÿ•ต๏ธVector Smuggling
Consistent hashing
eli.thegreenplace.netยท2dยท
Discuss: Hacker News
๐ŸŒDistributed Hash
PHP 8.5 focusses on readability, debugging features and more security
heise.deยท3h
๐Ÿ”„Language Evolution
A Practical Guide to Regular Expressions โ€“ Learn RegEx with Real Life Examples
freecodecamp.orgยท9h
๐Ÿ”RegEx Engines
Sparking joy
leancrew.comยท18h
๐ŸŽฏArithmetic Coding Theory
CBOR ๅ’Œ MsgPack ๆ˜ฏไธ€ๅ›žไบ‹
blog.est.imยท2d
๐Ÿ”CBOR
Notes, 2025-09-29
scopeofwork.netยท1h
โญAwesome lists
Apply the Trie: Word Search
mmhaskell.comยท6h
๐ŸŒณTrie Structures
RFC 677: Maintenance of duplicate databases (1975)
rfc-editor.orgยท11hยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
Halo2's Elegant Transcript As Proof
cryptologie.netยท1d
๐ŸŽฏPerformance Proofs
How to Use a Password Manager to Share Your Logins After You Die (2025)
wired.comยท4h
โณTime Capsule Networks
Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italyโ€™s Piracy Shield
labs.ripe.netยท5h
๐Ÿดโ€โ˜ ๏ธPiracy
What Are Public and Private Keys: An Intro to the Mathematics of Crypto Security
hackernoon.comยท10h
๐Ÿ”—Hash Chains
CodeQL zero to hero part 5: Debugging queries
github.blogยท20m
๐Ÿ”“Reverse engineering
Sex offenders, terrorists, drug dealers, exposed in spyware breach
malwarebytes.comยท53m
๐Ÿ”“Hacking
Working at ABI boundaries
rkrishnan.orgยท1d
๐Ÿฆ€Rust Borrowing