Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท12hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Building A Real-Time Communication System Using Go and WebSocket
dev.toยท7hยท
Discuss: DEV
๐ŸŒWebSocket Framing
The Alignment Waltz: Jointly Training Agents to Collaborate for Safety
arxiv.orgยท22h
๐Ÿ”ฒCellular Automata
Bidirectional type checking step by step (in Ruby)
luizpvas.github.ioยท3hยท
Discuss: Hacker News
โฌŒBidirectional Typing
Learning from software errors โ€“ Part 3: A Mars probe gets out of control
heise.deยท18h
๐Ÿ“žSession Types
The Why of PGP Authentication
articles.59.caยท13h
๐Ÿ”‘Cryptographic Protocols
How I found an unauthenticated goldmine of PII
infosecwriteups.comยท14h
๐Ÿ”“Hacking
Experimenting with ACL2 and Claude Code
mikedodds.orgยท14hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
When AI Remembers Too Much โ€“ Persistent Behaviors in Agentsโ€™ Memory
unit42.paloaltonetworks.comยท1d
๐Ÿ”ฒCellular Automata
Three ways formally verified code can go wrong in practice
buttondown.comยท9h
๐Ÿ“œProof Carrying Code
QUIC! Jump to User Space!
hackaday.comยท10h
๐ŸŒNetwork Protocols
SymmACP: extending Zed's ACP to support Composable Agents
smallcultfollowing.comยท2d
๐ŸŒProtocol Synthesis
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท12hยท
Discuss: Hacker News
๐Ÿ”—Lisp
Is GRPO Broken?
neelsomaniblog.comยท1hยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.ioยท6hยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
Show HN: TrustMesh โ€“ Open-source reputation layer for AI agents
github.comยท13hยท
๐ŸŒณArchive Merkle Trees
Three Solutions to Nondeterminism in AI
blog.hellas.aiยท2dยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท2dยท
๐Ÿ”‘Cryptographic Protocols