The Why of PGP Authentication
articles.59.caยท1d
๐Ÿ”‘Cryptographic Protocols
Thumbing through the DNS Trail of the TAOTH Campaign
circleid.comยท6h
๐Ÿ“กDNS Archaeology
Trying to find an app to overview my homelab
reddit.comยท5hยท
Discuss: r/homelab
๐Ÿ Homelab Archaeology
Fighting Email Spam on Your Mail Server with LLMs โ€” Privately
cybercarnet.euยท9hยท
โšกgRPC
JSON Schema Compatibility and the Robustness Principle
yokota.blogยท4dยท
Discuss: Hacker News
๐Ÿ“‹Protocol Buffers
The Trillion Dollar AI Software Development Stack
a16z.comยท1dยท
Discuss: Hacker News
โšกProof Automation
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.toยท18hยท
Discuss: DEV
๐Ÿ”—Supply Chain
Show HN: An open-source starter kit for implementing OWASP ASVS 5.0
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Ship Broken Things
matmul.netยท2dยท
Discuss: Hacker News
๐Ÿ”—Topological Sorting
RedTWIZ: Diverse LLM Red Teaming via Adaptive Attack Planning
arxiv.orgยท2d
โš”๏ธLean Tactics
Building on vibes: Lessons from three years with LLMs
world.hey.comยท2dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Building the Reasoning Engine at Axiom
axiommath.aiยท1dยท
Discuss: Hacker News
โš”๏ธLean Tactics
Cap'n Proto in WASM
mikel.xyzยท5dยท
Discuss: Hacker News
๐ŸŒWASI
SSH Security: Why You Should Touch to Verify
ubicloud.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
The Rise of Reactive Backends That Adapt in Real Time
dev.toยท16hยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Proposal: Deconfig โ€“ Distributed Git Infrastructure with Durable Objects
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆGit LFS
LLC Artificial Intelligence Trained to Lie by Omission
dev.toยท8hยท
Discuss: DEV
๐Ÿ“Code Metrics
Google Agent Development Kit (ADK) for TypeScript
github.comยท8hยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Autonomous AI Hacking and the Future of Cybersecurity
schneier.comยท1dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Show HN: Using Haskell to write an NES emulator
github.comยท2hยท
Discuss: Hacker News
๐Ÿ•นEmulation