OpenTelemetry Collector: The Backbone of Modern Observability Pipelines
blog.devops.dev·4h
👁️System Observability
Flag this post
The art and science of effective security storytelling
redcanary.com·4h
🔗Data Provenance
Flag this post
The tricky science of Internet measurement
blog.cloudflare.com·4h
📡Network Archaeology
Flag this post
The Impossible Optimization, and the Metaprogramming to Achieve It
verdagon.dev·2h·
🧪Binary Fuzzing
Flag this post
Show HN: Pinpam, TPM2-backed pin authentication for Linux
github.com·2h·
Discuss: Hacker News
🔒Hardware Attestation
Flag this post
How a hacking gang held Italy’s political elites to ransom
politico.eu·14h
🕳️Information Leakage
Flag this post
Topological Data Persistence Analysis for Anomaly Detection in Complex Network Systems
dev.to·13h·
Discuss: DEV
🕳️Persistent Homology
Flag this post
How Archaeology Is Reviving the Smell of History
scientificamerican.com·6h
📚Documentation Archaeology
Flag this post
Agentic AI introduces new security challenges in era of MCP and A2A
techradar.com·2h
🔐Capability Systems
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·6h
🕳️Information Leakage
Flag this post
First Wap: A Surveillance Computer You’ve Never Heard Of
schneier.com·6h
📊PCAP Analysis
Flag this post
A Metal Detectorist Found Ancient Roman Coins—Then Hid Them From Authorities for 8 Years
popularmechanics.com·3h
🗝️Paleocryptography
Flag this post
But What Is the Internet Layer?
lakshyamittal.substack.com·2d·
Discuss: Substack
📡Network Protocol Design
Flag this post
Which tech company launched the world's first bug bounty program?
techspot.com·1h
🚀Indie Hacking
Flag this post
TOR Exit Node Monitoring Overview
elastic.co·17h
🧅Tor Networks
Flag this post
Fibre Optic Cable Help (what do I need?)
amazon.co.uk·1h·
Discuss: r/homelab
🖥Home Lab Setup
Flag this post
Thompson’s Reflections on Trusting Trust revisited
irreal.org·1h
🔓Hacking
Flag this post
Building Better Software: Why Workflows Beat Code Every Time • Ben Smith & James Beswick • GOTO 2025
youtube.com·4h
🔄Reproducible Builds
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·13h
🌐NetworkProtocols
Flag this post