Catalog of reliability properties for blockchains (Antithesis)
antithesis.com·16h·
Discuss: Hacker News
🤝Distributed Consensus
Flag this post
A Soft‑Fork Proposal for Blockchain‑Based Distributed AI Computation
hackernoon.com·22h
🤝Consensus Algorithms
Flag this post
News for October 2025
ptreview.sublinear.info·10h
🧪Property-Based Testing
Flag this post
Byzantine Attacks in RIS-Enhanced Cooperative Spectrum Sensing: A Decision Fusion Perspective
arxiv.org·1d
🛡️Byzantine Fault Tolerance
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.net·1d
🛡️ARM TrustZone
Flag this post
Generalized Consensus: Consistent Reads
multigres.com·2d·
Discuss: Hacker News
🏛️Byzantine Archiving
Flag this post
Reflections on Trusting Trust (1984)
web.archive.org·1d·
Discuss: Hacker News
📜Proof Carrying Code
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography in Cross-Silo Model Aggregation
dev.to·1d·
Discuss: DEV
🔐Quantum Security
Flag this post
Kubernetes + Ceph: Your Freedom from the Cloud Cartel
oneuptime.com·12h·
🖥️Self-hosted Infrastructure
Flag this post
Identifying Linux Kernel Instability Due to Poor RCU Synchronization
arxiv.org·4h
🔍eBPF
Flag this post
Fast Answering Pattern-Constrained Reachability Queries with Two-Dimensional Reachability Index
arxiv.org·4h
🌸Bloom Filters
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.com·1d·
Discuss: Hacker News
🎯Performance Proofs
Flag this post
Valuable News – 2025/11/03
discoverbsd.com·18h
🔌Operating system internals
Flag this post
Detecting XZ in Debian with Otto Kekäläinen
opensourcesecurity.io·1d
❄️Nixpkgs
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·19h
🦠Malware Analysis
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.com·8h·
🔓Open Source Software
Flag this post
Reevaluating Self-Consistency Scaling in Multi-Agent Systems
arxiv.org·4h
🔲Cellular Automata
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·16h·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Why I don't see many advantages in decentralized platforms
news.ycombinator.com·6h·
Discuss: Hacker News
🤝Distributed Consensus
Flag this post
Design of quasi phase matching crystal based on differential gray wolf algorithm
arxiv.org·4h
📐Linear Algebra
Flag this post