Arti 1.7.0 released: Onion service restricted discovery, experimental HTTP proxy, relay development, and more.
blog.torproject.org·1d
🔒Linear Types
Flag this post
Recapping our inaugural Axe-con Mini event
deque.com·1h
⚙️Proof Engineering
Flag this post
Report on our investigation of the 2025-10-20 incident in AWS us-east-1
planetscale.com·1d
🤝Distributed Consensus
Flag this post
Replacing my old desktop, a high-end Linux PC
boyter.org·1d
🖥️Terminal Renaissance
Flag this post
jlesage/docker-jdownloader-2
github.com·17h
📦Container Security
Flag this post
Cyber experts warn of the 'catastrophic' threat quantum computing could pose
9news.com.au·7h·
Discuss: Hacker News
🔐Quantum Security
Flag this post
ISC2 Security Congress: The shaky state of AI security today
scworld.com·2d·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
Plugin System Options
reddit.com·23h·
Discuss: r/golang
gRPC
Flag this post
ASAN: A conceptual architecture for a self-creating, energy-efficient AI system
github.com·1d·
Discuss: Hacker News
🤖Network Automation
Flag this post
Show HN: Polyglot Docker dev environment setup – C/C++/Rust/Python
github.com·13h·
Discuss: Hacker News
🕸️WebAssembly
Flag this post
Active transfer learning for structural health monitoring
arxiv.org·1d
🧠Machine Learning
Flag this post
Prepared for a cyber attack? The three questions that businesses must ask themselves
techradar.com·1d
🚨Incident Response
Flag this post
Automated Verification of Terrestrial Ecosystem Resilience via Hyperdimensional Network Analysis
dev.to·2d·
Discuss: DEV
🕸️Algebraic Topology
Flag this post
OpenAI API moonlights as malware HQ in Microsoft’s latest discovery
theregister.com·6h
🔓Hacking
Flag this post
How to Data Engineer the ETLFunnel Way
dev.to·3d·
Discuss: DEV
🌊Stream Processing
Flag this post
Why Multimodal AI Broke the Data Pipeline — And How Daft Is Beating Ray and Spark to Fix It
hackernoon.com·1d
🌊Streaming Algorithms
Flag this post
The Learning Loop and LLMs
martinfowler.com·4h·
Discuss: Hacker News
🧩WASM Components
Flag this post
How Unified Communication Platforms Are Transforming Business Connectivity
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
Flag this post
Android Apps misusing NFC and HCE to steal payment data on the rise
securityaffairs.com·1d
🎫Kerberos Attacks
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·13h
🔐Homomorphic Encryption
Flag this post