Encryption, Self-hosted Services, Data Sovereignty, P2P Networks
VPN Musings
bfloeser.deΒ·2d
How to Tell If a Phone App Is Invading Your Privacy (and How to Limit It)
lifehacker.comΒ·18h
Secure Third-Party Tool Calling: A Guide to LangGraph Tool Calling and Secure AI Integration in Python
auth0.comΒ·1d
Finding A New Model For Hacker Camps
hackaday.comΒ·20h
My A-Z toolbox: dcfldd
rubenerd.comΒ·13h
Whatβs hierarchical about a hierarchical wallet?
johndcook.comΒ·1h
Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions
eff.orgΒ·18h
Loading...Loading more...