Onion Routing, Privacy Networks, Anonymous Communication, Censorship Resistance

A new home for Tor user documentation
blog.torproject.org·5d
📡DNS Archaeology
Flag this post
Government Urges Total Ban of Our Most Popular Wi-Fi Router
cnet.com·2d·
Discuss: Hacker News
🕸️Mesh Networking
Flag this post
Semanticide
futureofjewish.com·2d·
Discuss: Hacker News
🧲Magnetic Philosophy
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·2d·
Discuss: Hacker News
🔗Network Calculi
Flag this post
Gated DeltaNet (Linear Attention variant in Qwen3-Next and Kimi Linear)
sebastianraschka.com·12h·
Discuss: r/LLM
🤖Grammar Induction
Flag this post
The rise of agentic AI in cybersecurity
techradar.com·34m
🎯Threat Hunting
Flag this post
My First Multi-GPU Kernel: Writing All-to-All for AMD MI300X
gau-nernst.github.io·14h·
Discuss: Hacker News
Homebrew CPUs
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·3d
🛣️BGP Hijacking
Flag this post
Flying autonomous drones jointly transport loads
heise.de·2h
⚙️Tape Transport
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·4d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
How to Data Engineer the ETLFunnel Way
dev.to·1d·
Discuss: DEV
🌊Stream Processing
Flag this post
Scaling Coding-Agent RL to 32x H100s. 160% Improvement on Stanford's TBench
github.com·3h·
⚔️Lean Tactics
Flag this post
When Logs Become Chains: The Hidden Danger of Synchronous Logging
systemdr.substack.com·1d·
🌊Stream Processing
Flag this post
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
dev.to·5d·
Discuss: DEV
🏺Protocol Archaeology
Flag this post
Simplifying Preference Elicitation in Local Energy Markets: Combinatorial Clock Exchange
arxiv.org·10h
🤝Consensus Algorithms
Flag this post
Hierarchy Elevates Social Reasoning
positron.solutions·23h·
Discuss: Hacker News
🌍Cultural Algorithms
Flag this post
From Connectivity to Capability: Rethinking the Digital Divide
internetsociety.org·3d
🌍Cultural Computing
Flag this post
Conduent January 2025 breach impacts 10M+ people
securityaffairs.com·7h
🛡Cybersecurity
Flag this post
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
theregister.com·16h
🔓Hacking
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.org·10h
🔍Vector Forensics
Flag this post