The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท1dยท
๐Ÿ”PKI Archaeology
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.toยท1hยท
Discuss: DEV
๐ŸŒNetworkProtocols
19.5 years in Digital Preservation
aranewprofessionals.wordpress.comยท4h
๐Ÿ’พData Preservation
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท9h
๐Ÿ”Cryptographic Archaeology
Learning to Route: A Rule-Driven Agent Framework for Hybrid-Source Retrieval-Augmented Generation
arxiv.orgยท17h
๐Ÿ”Information Retrieval
A Global Mining Dataset
tech.marksblogg.comยท10hยท
Discuss: Hacker News
๐Ÿ“ฆMETS Containers
Medium Android App โ€” Migrating from Apollo Kotlin 3 to 4: Lessons Learned
medium.engineeringยท13h
๐ŸŽ๏ธVarnish Cache
Fitting It All in Your Head
systemsapproach.orgยท14h
๐Ÿ“กBGP Archaeology
Data Management for Collaborations
dataabinitio.comยท5h
๐Ÿ“ฆMETS Containers
My time at Oracle: functional and design specification reviews
smalldatum.blogspot.comยท2hยท
๐Ÿ’พPersistence Strategies
Nix pills
nixos.orgยท1d
โ„๏ธNixpkgs
FIPS certified vs. FIPS compliant: Whatโ€™s the real difference?
yubico.comยท6h
๐Ÿ”Certificate Analysis
Why did the รผber-protocols fail? A history of OOP RPC
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Applied Networking Research Prize 2026 Nominations Now Open
ietf.orgยท8h
๐Ÿ“กNetwork Protocol Design
The anvil of alignment: The value of monoliths over microservices
testdouble.comยท21h
๐ŸคDistributed Consensus
Multi-Platform Video Uploads: Using Identity Provider Links
fusionauth.ioยท5hยท
Discuss: Hacker News
๐ŸŽฌWebCodecs
Boundary Intelligence: Why What You Can Access Matters More Than What You Know
fortelabs.comยท2h
๐Ÿง Intelligence Compression
Agentic AI Is Quickly Resetting the Internet
thenewstack.ioยท3h
๐ŸŒŠStreaming Systems
How we trained an ML model to detect DLL hijacking
securelist.comยท13h
๐Ÿ”—Binary Similarity
I'm Building a Browser for Reverse Engineers
nullpt.rsยท21hยท
๐Ÿ›ก๏ธWASM Sandboxing