Generalized Consensus: Discovery and Propagation
multigres.comยท22hยท
Discuss: Hacker News
๐ŸคConsensus Networks
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
dev.toยท7hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
Challenging the Fastest OSS Workflow Engine
obeli.skยท14hยท
๐Ÿ”„Sync Engine
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
How Cover Whale Scaled Its Developer Platform Beyond an MVP
thenewstack.ioยท10h
๐Ÿ‘๏ธObservatory Systems
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.ioยท8h
๐Ÿ“ŸTerminal Forensics
Flag this post
Designing Smarter Health Checks for Pomerium
pomerium.comยท1dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
Flag this post
Making MLS More Decentralized
blog.phnx.imยท2dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
Durable execution workflow system based on Postgres
github.comยท8hยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Flag this post
Resilience, not sovereignty, defines OpenStack's next chapter
theregister.comยท11h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Flag this post
A problem that takes quantum computers an unfathomable amount of time to solve
phys.orgยท11h
โš›๏ธQuantum Storage
Flag this post
Open-sourcing yensid
garnix.ioยท2d
โ„๏ธNixpkgs
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.comยท6hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Ÿ”“Decompilation
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Oops, My UUIDs Collided
alexsci.comยท3hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post