Cryptography, Authentication, Authorization, Secure Protocols, Threat Modeling

Berkeley Police Department Transitioning to Encrypted Radio Communications
local.nixle.comยท16hยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comยท6dยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post
Made a short video to help people get started with Zabbix, deployed via Docker
youtu.beยท21hยท
Discuss: r/homelab
๐ŸณDocker
Flag this post
Show HN: Kumi โ€“ a portable, declarative, functional core for business logic
kumi-play-web.fly.devยท16hยท
Discuss: Hacker News
๐Ÿ—๏ธDatabase Internals
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.aiยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
The future of work is still human
ft.comยท18h
๐Ÿ”ฌeBPF
Flag this post
Storage news ticker โ€“ 3 November 2025
blocksandfiles.comยท2d
๐Ÿ”ฌeBPF
Flag this post
HTB: Dump
0xdf.gitlab.ioยท2d
๐Ÿ”ฌeBPF
Flag this post
Creating Private, High-Availability Azure Blob Storage for Internal Backups
dev.toยท9hยท
Discuss: DEV
โ˜๏ธCloud Computing
Flag this post
The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
thehackernews.comยท3d
๐Ÿ”ฌeBPF
Flag this post
U.S. CISA adds Gladinet CentreStack, and CWP Control Web Panel flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐Ÿ”ฌeBPF
Flag this post
Will Developers Survive AI Takeover? Part 4: The Popstar Developer
dev.toยท13hยท
Discuss: DEV
โ˜๏ธCloud Computing
Flag this post
Tech With Tim: Learn Fast API With This ONE Project
dev.toยท4hยท
Discuss: DEV
๐Ÿ”ŒAPI Design
Flag this post
E Tech Group Recognized with CSIA's First Certification for an Enterprise
prnewswire.comยท21h
๐Ÿ”—Distributed Systems
Flag this post
Programming Languages Lie: Variables Arenโ€™t What You Think They Are
dev.toยท11hยท
Discuss: DEV
๐Ÿฆ€Rust
Flag this post
CampusGuard & VO Form Strategic Partnership to Expand in the U.S.
prnewswire.comยท1d
๐Ÿ”ฌeBPF
Flag this post
Hackers are teaming up with organized crime gangs to steal cargo right from supply chains
techradar.comยท1d
๐Ÿฆ€Rust
Flag this post
EP-HDC: Hyperdimensional Computing with Encrypted Parameters for High-Throughput Privacy-Preserving Inference
arxiv.orgยท2d
๐Ÿ”ฌeBPF
Flag this post
Data breach at major Swedish software supplier impacts 1.5M
bleepingcomputer.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post