Rybbit โ€“ The Modern Open Source Google Analytics Replacement
rybbit.comยท11hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Flag this post
The GDPR proposal unveiled officially
blog.lukaszolejnik.comยท3dยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Flag this post
Hacker Review of Ghost in the Shell (1995)
hackerfiction.netยท21hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท2d
๐Ÿ”Quantum Security
Flag this post
Banned by Musk, Threatened by Krebs
jpendleton.substack.comยท13hยท
Discuss: Substack
๐ŸŽซKerberos Attacks
Flag this post
Exploring Thompson Sampling for model selection
sourcepilot.coยท3hยท
Discuss: Hacker News
๐Ÿ”Type Inference
Flag this post
The Limits of Formal Security Models โ€“ Dorothy E. Denning (1999)
faculty.nps.eduยท3dยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Flag this post
The best privacy laws in the world: These three VPNs are on sale for a limited time
techradar.comยท1d
๐Ÿง…Tor Networks
Flag this post
Ask HN: How can you search your personal data?
news.ycombinator.comยท3dยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post
DeepSeek-R1 Generates Insecure Code with Politically Sensitive Terms
heise.deยท2d
๐ŸงชBinary Fuzzing
Flag this post
Google banned 158,000 indie developers last year. Here's why
medium.comยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Flag this post
A 3-Question Framework for Making Ethical Tech Decisions
thenewstack.ioยท3d
โš–๏ธLossy Compression Ethics
Flag this post
Why Eating Alone Could Be Surprisingly Dangerous for Older Adults
scitechdaily.comยท20h
๐Ÿ“กRSS Readers
Flag this post
Building a Distributed Database in Elixir (Part 2: Architecture and the Beam)
medium.comยท2dยท
Discuss: Hacker News
๐ŸคDistributed Consensus
Flag this post
๐ŸŽ“ Capstone Project Completed! ๐Ÿš€
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ต๏ธMetadata Mining
Flag this post
Exclusive Reveal: Code Sandbox Tech Behind Manus and Claude Agent Skills
dev.toยท4hยท
Discuss: DEV
โš™๏ธWASM Runtime
Flag this post
Kyber vs. RSA-2048
blog.ellipticc.comยท2dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Flag this post
When AI Democratizes Exploitation: LLM-Assisted Strategic Manipulation of Fair Division Algorithms
arxiv.orgยท4d
๐ŸคSecure Multiparty
Flag this post
Hyperscalers Are Hard
shvbsle.inยท2dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Flag this post