BYOD security solutions explained
proton.meยท17hยท
Discuss: Hacker News
๐Ÿ”’Security
Flag this post
Cybersecurity Weekly #6: Safe Password Practices & Password Alternatives in 2025
dev.toยท11hยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
DAVxโต, Open Source CalDAV / CardDAV / WebDAV for Android
davx5.comยท14hยท
Discuss: Hacker News
๐Ÿ’ฟIndexedDB
Flag this post
Generalized Consensus: Discovery and Propagation
multigres.comยท1dยท
Discuss: Hacker News
๐ŸŒณJujutsu
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.ioยท4dยท
Discuss: Hacker News
๐ŸฆญPodman
Flag this post
Internetcu.be: Let's Build a Free, Neutral and Decentralized Internet Together
internetcu.beยท21hยท
Discuss: Hacker News
๐Ÿ†“Free Services
Flag this post
Punching Holes into Firewalls
sebsauvage.netยท1dยท
Discuss: Hacker News
๐ŸŒNetwork Security
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท2dยท
Discuss: Hacker News
๐ŸŽญPrivacy Engineering
Flag this post
Beyond IP lists: a registry format for bots and agents
blog.cloudflare.comยท1dยท
Discuss: Hacker News
๐ŸŒWeb Standards
Flag this post
Health insurance company tries reverse domain name hijacking
domainnamewire.comยท13hยท
Discuss: Hacker News
๐Ÿ“กPOSSE
Flag this post
Data Federation: Unifying Distributed Data for Intelligent Decision-Making
nexla.comยท11hยท
Discuss: DEV
๐Ÿ“ŠData Pipelines (ETL)
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toยท2dยท
Discuss: DEV
๐Ÿ’ธAffordable LLMs
Flag this post
Codie's Cognitive Chronicles: The Three-Phase Ritual That Preserves Identity Across Disruption
apa.orgยท2dยท
Discuss: DEV
๐Ÿ“ˆHabit Stacking
Flag this post
Wireheading City
geohot.github.ioยท10hยท
Discuss: Hacker News
๐Ÿ“‹Infrastructure as Code (IaC)
Flag this post
How Telecoms Monetize Security Bundles by Adding Password Managers
purevpn.comยท18hยท
Discuss: DEV
๐Ÿ”Hardware Security
Flag this post
Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting
zeroday.forem.comยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธAI Security
Flag this post
Show HN: DocSend Alternative for B2B Sales
sizle.ioยท12hยท
Discuss: Hacker News
๐Ÿ”–Bookmarklet Development
Flag this post
I'm an IIT Madras Student. But to Some, I'm Diluting the Brand
ishan.pageยท8hยท
Discuss: Hacker News
๐Ÿ‘Code Review
Flag this post
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
dev.toยท18hยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace
dev.toยท15hยท
Discuss: DEV
๐Ÿ”งCode Refactoring Patterns
Flag this post