OSTIF Community Spotlight 001.2025: Introduction, David Korczynski and Adam Korczynski
ostif.orgยท2d
๐Ÿ”“Open Source Software
Indian Call Center Scammers partner with Chinese Money Launderers
garwarner.blogspot.comยท4hยท
๐ŸŽซKerberos Attacks
The founder of ID.me on war, vocation, and identity
joincolossus.comยท6hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Swiss Government Looks To Undercut Privacy Tech, Stoking Fears of Mass Surveillance
yro.slashdot.orgยท2d
๐Ÿ”’Privacy Archives
MoroJS A fast, TypeScript-first API framework (68k req/SEC, AI-ready)
morojs.comยท2dยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
I Like 669 Better
datastream.substack.comยท39mยท
Discuss: Substack
โšกZStandard
Optimizing 100B ClickHouse Events
replo.computerยท2dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
BVP: Mastering product-market fit- A detailed playbook for AI founders
bvp.comยท1dยท
Discuss: Hacker News
๐Ÿง Intelligence Compression
An Afternoon at the Recursive Cafรฉ: Two Threads Interleaving
ipfs.ioยท8hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Bcachefs Outlines Plans For Shipping As A DKMS Out-Of-Tree Kernel Module
phoronix.comยท2d
๐Ÿ”ฉSystems Programming
This board helps you prototype circuits with tubes
hackaday.comยท10h
โš™๏ธDIY Electronics
GraphQL Router / API Gateway framework written in Golang
github.comยท2dยท
Discuss: r/golang
๐Ÿ”“Open Source Software
Building an Interactive Game With Kiro
dev.toยท1dยท
Discuss: DEV
๐ŸŽฎSwitch Archaeology
Agentic Misalignment in LLMs: Unmasking Risks, Real Examples, and What CTOs Must Do Now
dev.toยท2dยท
Discuss: DEV
โš™๏ธProof Engineering
Claudeโ€™s memory architecture is the opposite of ChatGPTโ€™s
dev.toยท2dยท
Discuss: DEV
โšกHardware Transactional Memory
HybridPetya: More proof that Secure Boot bypasses are not just an urban legend
theregister.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Secure Boot
Built-in Runtime Security for Containers
blog.qualys.comยท5d
๐Ÿ“ฆContainer Security
When SaaS Trust Becomes a Threat: Insights from the Salesloft Drift Compromise
securityscorecard.comยท4d
๐ŸŽซKerberos Attacks
Unlocking Real-Time Responsiveness: The Secret to Supercharged Voice AI
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Unlock Restaurant Efficiency with AI: Identifying & Managing the Chaos
dev.toยท23hยท
Discuss: DEV
๐ŸŒŠStreaming Systems