Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
Unusual circuits in the Intel 386's standard cell logic
righto.com·15h·
Circuit Archaeology
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
Distance Measurement Using Basys3
hackster.io·1d
🕹️Hardware Emulation
Flag this post
RuBee
computer.rip·9h
📻Homebrew Protocols
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·15h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
I use AI to synthesize all my datasets now
thefulldatastack.substack.com·12h·
Discuss: Substack
🧠Query Planners
Flag this post
A dream of AI DLC A peek into the future based on tools and tech that we have
magistr.me·11h·
Discuss: Hacker News
⚙️Proof Engineering
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·13h·
Discuss: Hacker News
Bidirectional Typing
Flag this post
Making Sense of Memory in AI Agents
leoniemonigatti.com·1d·
Discuss: Hacker News
💾Persistence Strategies
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
It's LIT! Reliability-Optimized LLMs with Inspectable Tools
arxiv.org·3d
🌀Brotli Internals
Flag this post
No Deus ex Machina
thestoicprogrammer.substack.com·23h·
Discuss: Substack
🔩Systems Programming
Flag this post
Post-Quantum Cryptography in .NET
devblogs.microsoft.com·4d·
Discuss: Hacker News
🔐Quantum Security
Flag this post
Python Registry Pattern: A Clean Alternative to Factory Classes
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
Flag this post
Building JARVIS Properly - Phase 5: From Ultron's Ruins to JARVIS's Foundation
blog.scottlogic.com·1d
🦋Format Evolution
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
eBPF Rootkit
synacktiv.com·14h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post