Petnames: A humane approach to secure, decentralized naming

Related Stories

Petnames: A humane approach to secure, decentralized naming

Announcing Spritely Oaken

Functional hash tables explained

Building interactive web pages with Guile Hoot

Getting access to Secure Enclave

Novel approach to tokenize whole sentences for NLP using a signal processing approach

The WinRAR approach

Reverse Code Review: My Approach To Code Reviews

genconfig - A different approach to read your config

Show HN: Aberdeen – An elegant approach to reactive UIs

Introducing tnnmigga/enum: A Hacker's Approach to Enums in Go 🚀

Cloudflare's approach to global service health metrics and software releases

Grid-Free Approach to Partial Differential Equations on Volumetric Domains [pdf]

Can Secure Software be Developed in Rust? On Vulnerabilities and Secure Coding Guidelines

Commercial Solutions for Classified CSfC for NSA to deliver secure cybersecurity

Is go-iterator a secure tool?

How to build small and secure Docker images for Rust (FROM scratch)

We’re building a decentralized Reddit alternative, fully open-source—JS devs, we need you.

Breaking the Naming Bottleneck: Towards More Explicit Visual Semantics for Rust's `Map<K, V>`

How do you approach architecture with clean code.

Demonstrably Secure Software Supply Chains with Nix

Implementing cryptographically-secure API keys in Rust

How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms?

Passcay: Secure & fast Passkey (WebAuthn) library for Zig

How to Integrate AWS IAM Roles with RDS MySQL and Symfony for Secure Web Applications

Essence-Based Interpretation (EBI) – A Practical Approach for Software Design

Secure by Design: Google’s Perspective on Memory Safety (2024)

S3Safe: Lightweight CLI Tool for Secure S3 Backups and Restores

Rust Actix Web API for Secure Image Storage in S3

Need to scrape ~3 million items from a website — what's the best approach for large-scale scraping?