Gprxy: Go based SSO-first, psql-compatible proxy
github.com·14h
⛓️Blockchain Security
Flag this post
Ask HN: Freelancer? Seeking freelancer? (November 2025)
news.ycombinator.com·14h·
Discuss: Hacker News
🖥️Self-hosted apps
Flag this post
Credentials Evidence or Simulate
preludes.eu·12h·
Discuss: Hacker News
🚫Zero Trust
Flag this post
Low-Level Hacks
blog.raycursive.com·6h·
Discuss: Hacker News
🏹Effect Systems
Flag this post
A Soft‑Fork Proposal for Blockchain‑Based Distributed AI Computation
hackernoon.com·21h
⛓️Blockchain Security
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
github.com·4h·
Discuss: Hacker News
🏛️Technical Architecture
Flag this post
Mist-Assisted Federated Learning for Intrusion Detection in Heterogeneous IoT Networks
arxiv.org·3h
📡Edge Computing
Flag this post
How Cybersecurity Teams Can Work Better with DevOps
devops.com·12h
🔄DevSecOps
Flag this post
We built a simple AI-powered tool for URL Monitoring + On-Call management — now live (Free tier)
reddit.com·1d·
Discuss: r/kubernetes
🖥️Self-hosted apps
Flag this post
Architectural debt is not just technical debt
frederickvanbrabant.com·15h·
🏛️Technical Architecture
Flag this post
Uncrossed Multiflows and Applications to Disjoint Paths
arxiv.org·3h
🏹Effect Systems
Flag this post
Part 4: Building Station Station - Where SDD Helped (and Where It Didn't)
dev.to·2h·
Discuss: DEV
🛠️Product Security
Flag this post
Part 4: Building Station Station - Where SDD Helped (and Where It Didn't)
dev.to·3h·
Discuss: DEV
🛠️Product Security
Flag this post
Part 4: Building Station Station - Where SDD Helped (and Where It Didn't)
dev.to·3h·
Discuss: DEV
🛠️Product Security
Flag this post
ISC2 Security Congress: The shaky state of AI security today
scworld.com·1d·
Discuss: Hacker News
🛡️AI Security
Flag this post
How I Built gemini-imagen: A CLI for Google Gemini Image Generation
dev.to·14h·
Discuss: DEV
🖥️Self-hosted apps
Flag this post
Do I want Coders to Code?
yeikoff.xyz·10h·
Discuss: Hacker News
🔄DevSecOps
Flag this post
Application of Blockchain Frameworks for Decentralized Identity and Access Management of IoT Devices
arxiv.org·3h
⛓️Blockchain Security
Flag this post
I Benchmarked 3 Go Concurrency Patterns. The "Fastest" One Would Destroy Production
dev.to·2h·
Discuss: DEV
👁️Observability
Flag this post
Cocoon from Telegram: A Decentralized AI Network That Pays GPU Owners in Crypto
decrypt.co·1d·
Discuss: Hacker News
⚙️AI Infrastructure
Flag this post