Join us

ContentUpdates and recent posts about Tor..
Link
@anjali shared a link, 5 months ago
Customer Marketing Manager, Last9

Top 7 Observability Platforms That Auto-Discover Services

Auto-discovery tools now detect services as they appear and build dashboards instantly. Here are seven platforms that do it well.

grafana_tempo
Link
@cadet15789 shared a link, 5 months ago
IT

Cut Your Docker Build Time in Half: 6 Essential Optimization Techniques

Pro tips to write dockerfiles. Cut your build timing of your images by half.

Dockerfiles
Story
@laura_garcia shared a post, 5 months ago
Software Developer, RELIANOID

The JLR Cyber Incident: A Warning Shot for the Automotive Industry

The major cyberattack that halted Jaguar Land Rover’s production for almost six weeks has exposed a hard truth: modern automotive manufacturing is deeply vulnerable to digital disruption. From frozen assembly lines to supplier chaos and regional economic fallout, the incident showed how quickly a si..

Supply-Chain-in-the-Automotive-Industry_RELIANOID
Link
@anjali shared a link, 5 months ago
Customer Marketing Manager, Last9

What is AWS Fargate for Amazon ECS?

Understand how AWS Fargate runs your ECS containers without servers—just define CPU, memory, and networking, and AWS handles the compute.

aws_fargate
Story
@shurup shared a post, 5 months ago
@palark

Helm v4 new features and changes

Helm

Helm v4 has been released a week ago. Its highlights are: - Server-Side Apply instead of 3-Way Merge - WASM plugins - Using kstatus for resource tracking - Content-based chart caching This articleprovides a detailed overview of why these changes were made in Helm v4 and what they bring for Helm user..

Story
@laura_garcia shared a post, 5 months ago
Software Developer, RELIANOID

✈️ Ensuring Efficiency and Security in Airport Operations

Today we highlight our main diagram “Airport Software Systems”, showcasing how integrated airport management platforms —from AODB to landside & airside operations, billing, and information systems— work together to ensure efficient and secure airport operations. We also explain how load balancing en..

Airport Software Systems
Link
@anjali shared a link, 5 months ago
Customer Marketing Manager, Last9

OTel Updates: Complex Attributes Now Supported Across All Signals

OTLP 1.9.0 adds support for maps, arrays, and byte arrays across all OTel signals. Here's when to use complex attributes and when to stick with flat.

otel_metrics_quarkus
Story
@laura_garcia shared a post, 5 months ago
Software Developer, RELIANOID

SOC 2 Compliance

📢 At RELIANOID, we follow SOC 2 Trust Service Criteria to ensure Security, Availability, Confidentiality, Processing Integrity, and Privacy across our load balancing solutions — whether on-prem, cloud, or hybrid. Our controls align with the needs of highly regulated environments such as finance, hea..

Link
@varbear shared a link, 5 months ago
FAUN.dev()

Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign

Chinese state-backed threat actorsorchestrated automated cyber attacks using AI technology developed byAnthropicin a highly refinedespionage campaignin mid-September 2025. The attackers leveraged AI to execute 80-90% of tactical operations independently at physically impossible request rates, markin.. read more  

Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign
Link
@varbear shared a link, 5 months ago
FAUN.dev()

10 MCP Servers to Optimize Developer Workflows

TheModel Context Protocol (MCP)wires AI agents into real-world dev workflows, think pushing to GitHub, deploying APIs, tweaking Docker, all straight from the code editor. MCP servers like GitHub MCP, Apidog MCP, and Supabase MCP plug into popular tools and infra. They let LLMs update code, ship APIs.. read more  

10 MCP Servers to Optimize Developer Workflows
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide