Guide: TLS and QUIC
moq.devยท14hยท
Discuss: Hacker News
๐Ÿฆ‹ATProto
Flag this post
Hardware to Prove Humanity
juliver.bearblog.devยท1dยท
Discuss: Hacker News
๐Ÿ’งLiquid Democracy
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comยท18hยท
Discuss: Hacker News
๐Ÿ›ก๏ธData Sovereignty
Flag this post
5 things I do to protect my home lab from potentially malicious services
xda-developers.comยท9h
๐Ÿ Self-Hosting
Flag this post
Aembit Introduces Identity and Access Management for Agentic AI
nextbigfuture.comยท1d
๐Ÿ’ปTechnology Policy
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.comยท1d
๐Ÿ™๏ธSmart Cities
Flag this post
๐Ÿ” Transparency Isn't Just What You Show
dev.toยท2hยท
Discuss: DEV
๐ŸซงFilter Bubbles
Flag this post
BYOD security solutions explained
proton.meยท17hยท
Discuss: Hacker News
๐Ÿ›ก๏ธData Sovereignty
Flag this post
The internet was made for privacy
doctorow.medium.comยท13h
๐Ÿ›ก๏ธData Sovereignty
Flag this post
AI and blockchain: financeโ€™s new power couple
fastcompany.comยท11h
๐Ÿค–AI Ethics
Flag this post
The One Cybersecurity Shift Every Business Needs to Make Right Now
entrepreneur.comยท2d
๐Ÿ‘ทWorker Self-Management
Flag this post
From Connectivity to Capability: Rethinking the Digital Divide
internetsociety.orgยท15h
๐Ÿ’ปDigital Democracy
Flag this post
Musings of a Trust Architect: The Exodus Protocol
lifewithalacrity.comยท4d
๐Ÿ’พLocal-first Software
Flag this post
Auth0 for Scaling Apps: Advanced Security and Authentication
auth0.comยท2d
๐ŸšชUser Onboarding
Flag this post
In defence of digital ID
timharford.comยท1d
๐Ÿ›ก๏ธData Sovereignty
Flag this post
Exploring Cloud Key Management Options
devops.comยท1d
๐Ÿ’พLocal-first Software
Flag this post
You Don't Own Me--Excerpt From New Libertarianism.org, Cato Institute Book
cato.orgยท2d
๐ŸŒSolidarity Economy
Flag this post
AWS account hygiene
me.micahrl.comยท2d
๐Ÿ Self-Hosting
Flag this post
Oops, My UUIDs Collided
alexsci.comยท11hยท
Discuss: Hacker News
๐ŸšŒGTFS
Flag this post