Join us

ContentUpdates and recent posts about Tor..
ย Activity
@vlebo added a new tool ctx_ , 3ย weeks, 5ย days ago.
Story
@laura_garcia shared a post, 3ย weeks, 5ย days ago
Software Developer, RELIANOID

๐—จ๐—ž ๐—ฃ๐—ฆ๐—ง๐—œ ๐—”๐—ฐ๐˜: ๐—” ๐—ก๐—ฒ๐˜„ ๐—˜๐—ฟ๐—ฎ ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†

๐Ÿ” ๐—จ๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—จ๐—ž ๐—ฃ๐—ฆ๐—ง๐—œ ๐—”๐—ฐ๐˜: ๐—” ๐—ก๐—ฒ๐˜„ ๐—˜๐—ฟ๐—ฎ ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† The UK is raising the bar on cybersecurity with the Product Security and Telecommunications Infrastructure (PSTI) Act, now in force since April 2024. As cyber threats continue to grow, this regulation introduces a baseline for ..

ย Activity
@omarabid added a new tool Code Input , 4ย weeks ago.
ย Activity
@hitechdigital created an organization HitechDigital Solutions , 4ย weeks ago.
Link
@varbear shared a link, 4ย weeks, 1ย day ago
FAUN.dev()

What if I stored data in my mouse

The author experimented with storing data in a Logitech mouse's flash memory. Logitech mice communicate through HID++, a protocol that maps device features using stable IDs. Despite efforts to write data to certain registers, only the DPI register could retain data across power cycles... read more ย 

Link
@varbear shared a link, 4ย weeks, 1ย day ago
FAUN.dev()

Introduction to PostgreSQL Indexes

This post is for developers that have an intuitive knowledge of what database indexes are, but donโ€™t necessarily know how they work internally, what are the tradeoffs associated with indexes, what are the types of indexes provided by postgres and how you can use some of its more advanced options to .. read more ย 

Introduction to PostgreSQL Indexes
Link
@varbear shared a link, 4ย weeks, 1ย day ago
FAUN.dev()

Bad Analogies:ย Not Every Money-Burning Company is Amazon

The essay discusses the misconceptions around companies that burn a lot of money, drawing comparisons to Amazon's successful strategy. It delves into examples like Uber and WeWork to highlight the importance of understanding the long-term implications of cash burn. The focus is on the strategies and.. read more ย 

Link
@varbear shared a link, 4ย weeks, 1ย day ago
FAUN.dev()

The Beginning of Programming as Weโ€™ll Know It

In the wake of AI coding assistants like Claude and Codex, many wonder if the human role of "computer programmer" is ending. Although AI shows promise, human developers are valuable in the current transitional period. Real programmers are uniquely positioned to harness AI's power while augmenting it.. read more ย 

The Beginning of Programming as Weโ€™ll Know It
Link
@varbear shared a link, 4ย weeks, 1ย day ago
FAUN.dev()

How Microsoft Vaporized a Trillion Dollars

A former Azure Core engineer recounts arriving on his first day to find a 122-person org seriously planning to port Windows-based VM management agents - 173 of them, which nobody could fully explain - onto a tiny, low-power ARM chip running Linux. The stack was already failing to scale on server-gra.. read more ย 

How Microsoft Vaporized a Trillion Dollars
Link
@kaptain shared a link, 4ย weeks, 1ย day ago
FAUN.dev()

Sandboxes: Run Agents in YOLO Mode, Safely

Over a quarterof production code is now AI-authored, with agents boosting pull requests by 60% when allowed to run autonomously in YOLO mode. Docker Sandboxes provide a safe boundary for agents, enabling fully autonomous operation without risking your machine or data... read more ย 

Sandboxes: Run Agents in YOLO Mode, Safely
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide