Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
dev.toยท4hยท
Discuss: DEV
๐Ÿ“‹Format Specification
Flag this post
Registry Analysis
windowsir.blogspot.comยท8hยท
๐Ÿ”NTLM Archaeology
Flag this post
Minimal Sufficiency: A Principle โ€˜Similarโ€™ to End-to-End
cacm.acm.orgยท4hยท
Discuss: Hacker News
๐Ÿ”—Network Calculi
Flag this post
The internet was made for privacy
doctorow.medium.comยท6h
๐ŸงฒMagnetic Philosophy
Flag this post
Context Engineering: The Foundation for Reliable AI Agents
thenewstack.ioยท2h
๐ŸŒŠStreaming Systems
Flag this post
OpenSMTPD 7.8.0p0
bsdsec.netยท12h
๐ŸกOpenBSD
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
ImapGoose status update: v0.3.2
whynothugo.nlยท8h
๐Ÿ”„Sync Engine
Flag this post
20+ Years in Tech: Things We Wish We Knew Sooner โ€ข Daniel Terhorst-North & Kevlin Henney
youtube.comยท8h
๐Ÿ Homelab Archaeology
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
Show HN: rstructor, Pydantic+instructor for Rust
github.comยท4hยท
Discuss: Hacker News
๐Ÿ”’Linear Types
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Ÿ”“Decompilation
Flag this post
Technology Short Take 189
blog.scottlowe.orgยท9h
๐Ÿ Homelab Archaeology
Flag this post
Building Up And Sanding Down
endler.devยท22h
๐Ÿ”ฉSystems Programming
Flag this post
Life Online Feels Fake Because of Drift: A Theory of Compression and Fidelity
therealitydrift.substack.comยท1dยท
Discuss: Substack
๐Ÿ’ฟBinary Musicology
Flag this post
Linking Heterogeneous Data with Coordinated Agent Flows for Social Media Analysis
arxiv.orgยท18h
๐Ÿ“ฅFeed Aggregation
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท15h
๐Ÿ”Hash Functions
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท13h
๐Ÿ›ก๏ธeBPF Security
Flag this post
The future of AI applications: MCP servers
techradar.comยท7h
๐ŸŒŠStream Processing
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post