Join us

ContentUpdates and recent posts about Tor..
 Activity
@varbear added a new tool pre-commit , 2 weeks ago.
 Activity
@devopslinks added a new tool GitGuardian , 2 weeks ago.
 Activity
@devopslinks added a new tool detect-secrets , 2 weeks ago.
 Activity
@devopslinks added a new tool Gitleaks , 2 weeks ago.
Course
@eon01 published a course, 2 weeks ago
Founder, FAUN.dev

DevSecOps in Practice

TruffleHog Flask NeuVector detect-secrets pre-commit OWASP Dependency-Check Docker checkov Bandit Hadolint Grype KubeLinter Syft GitLab CI/CD Trivy Kubernetes

A Hands-On Guide to Operationalizing DevSecOps at Scale

DevSecOps in Practice
Story Trigma Inc Team
@tairascott shared a post, 2 weeks ago
AI Expert and Consultant, Trigma

How Do Large Language Models (LLMs) Work? An In-Depth Look

Discover how Large Language Models work through a clear and human centered explanation. Learn about training, reasoning, and real world applications including Agentic AI development and LLM powered solutions from Trigma.

How do Large Language Models (LLMs) Work Banner
Story
@laura_garcia shared a post, 2 weeks ago
Software Developer, RELIANOID

🔐 RELIANOID at Gartner IAM Summit 2025 | Dec 8–10, Grapevine, TX

We’re heading to the Gartner Identity & Access Management Summit to showcase how RELIANOID’s intelligent proxy and ADC platforms empower modern IAM: enhancing Zero Trust enforcement, adaptive access, and hybrid/multi-cloud security. Join us to explore AI-driven automation, ITDR, and identity governa..

Gartner Identity and Access Management Summit 2025 relianoid
Link
@varbear shared a link, 2 weeks ago
FAUN.dev()

Confessions of a Software Developer: No More Self-Censorship

A mid-career dev hits pause after ten years in the game -realizing core skills likepolymorphism, SQL, and automated testingnever quite clicked. Leadership roles, shipping products, mentoring junior devs - none of it filled those gaps. They'd been writingC#/.NETfor a while too. Not out of love, just .. read more  

Confessions of a Software Developer: No More Self-Censorship
Link
@varbear shared a link, 2 weeks ago
FAUN.dev()

Building a Blockchain in Go: From 'Hello, Block' to 10,000 TPS

A new Go tutorial shows how to build a lean, fast blockchain - clocking ~10,000 TPS - without the usual bloat. It covers the full stack:P2P networking,custom consensus, and properstate management. No unbounded mempools. No missing snapshots. Just a chain that actually runs, benchmarked on real machi.. read more  

Link
@varbear shared a link, 2 weeks ago
FAUN.dev()

Inside the GitHub Infrastructure Powering North Korea’s Contagious Interview npm Attacks

The Socket Threat Research Team has been following North Korea’s Contagious Interview operation as it targets blockchain and Web3 developers through fake job interviews. The campaign has added at least197 malicious npm packagesand over31,000 downloadssince last report, showcasing the adaptability of.. read more  

Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide