Reading
LLMs and your career
↗
↖
Llms
Ai
Career
Hopecore
Reading
The State of OpenSSL for
pyca/cryptography
↗
↖Cryptography
Programming
Reading
University of Utah finds tape with only known copy of UNIX V4 hidden in storage
↗
↖
Programming
Reading
History
What can strong engineers do that weak engineers can't?
↗
↖
Programming
Reading
Career
Internet Security Research Group (ISRG) 2025 Annual Report
↗
↖
Cryptography
Systems
Reading
Signatures are like backups (2024)
↗
↖
Cryptography
Systems
Reading
It's not your codebase
↗
↖
Programming
Reading
Against Cipher Agility in Cryptography Protocols (2019)
↗
↖
Cryptography
Secure Design
Reading
Picking parameters (2022)
↗
↖
Cryptography
Reading
Invisible Salamanders Are Not What You Think (2024)
↗
↖
Cryptography
Key Management
Reading
Building a Transparent Keyserver
↗
↖
Transparency
Cryptography
Key Management
Reading
Experimenting with Post-Quantum Cryptography
↗
↖
Cryptography
Post-Quantum Cryptography
Reading
Your job is to deliver code you have proven to work
↗
↖
Programming
Llms
Reading
The Typestate Pattern in Rust
↗
↖
Rust
Programming
Secure Design
Cryptography
Reading
Arenas in Rust (2021)
↗
↖
Rust
Memory Management
Reading
Too Much Crypto (2019)
↗
↖
Cryptography
Reading
Should I Switch From Git to Jujutsu?
↗
↖
Jj
Programming
Reading
The UK Is Still Trying to Backdoor Encryption for Apple Users
↗
↖
Privacy
Eff
Reading
A Tour of WebAuthn (2024)
↗
↖
Passkeys
Cryptography
Reading
Don't write bugs
↗
↖
Programming
Debugging
Reading
TIGER_STYLE
↗
↖Zig
Programming
Reading
Burroughs' B6500/B7500 stack mechanism (1968)
↗
↖
Mainframes
History
Reading
Systems
Lord of the
io_uring
↗
↖Systems
Linux
Async
Reading
Scrypt is Maximally Memory-Hard (2016)
↗
↖Cryptography
Kdfs
Reading
Inside Zig's New Writer
↗
↖
Zig
Programming
Reading
Zig 0.15.1 Release Notes
↗
↖
Zig
Programming
Reading
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation (2005)
↗
↖
Zeroization
Cryptography
Reading
Jujutsu For Busy Devs
↗
↖
Jj
Programming
Reading
Zero Knowledge Proofs Alone Are Not a Digital ID Solution to Protecting User Privacy
↗
↖
Privacy
Cryptography
Zero-Knowledge Proofs
Reading
Eff
High-assurance zeroization (2023)
↗
↖
Zeroization
Cryptography
Reading
