Join us

ContentUpdates and recent posts about Tor..
ย Activity
@adrian_schmidt started using tool Express , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool AWS Lambda , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool Amazon Web Services , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool Amazon SES , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool Amazon S3 , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool Amazon EC2 , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool Amazon Cloudfront , 1ย week, 2ย days ago.
ย Activity
@adrian_schmidt started using tool Amazon ALB , 1ย week, 2ย days ago.
Story
@laura_garcia shared a post, 1ย week, 2ย days ago
Software Developer, RELIANOID

๐—•๐—ฒ๐˜๐˜ ๐—•๐—ฟ๐—ฎ๐˜€๐—ถ๐—น ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ

๐Ÿ“ Sรฃo Paulo, Brazil ๐Ÿ“… May 5โ€“8, 2026 ๐—ฅ๐—˜๐—Ÿ๐—œ๐—”๐—ก๐—ข๐—œ๐—— is heading to ๐—•๐—ฒ๐˜๐˜ ๐—•๐—ฟ๐—ฎ๐˜€๐—ถ๐—น ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ โ€” ๐˜ต๐˜ฉ๐˜ฆ ๐˜ญ๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ด๐˜ต ๐˜Œ๐˜ฅ๐˜›๐˜ฆ๐˜ค๐˜ฉ ๐˜ฆ๐˜ท๐˜ฆ๐˜ฏ๐˜ต ๐˜ช๐˜ฏ ๐˜“๐˜ข๐˜ต๐˜ช๐˜ฏ ๐˜ˆ๐˜ฎ๐˜ฆ๐˜ณ๐˜ช๐˜ค๐˜ข. ๐Ÿš€ 46,000+ professionals ๐Ÿ’ก 270+ companies ๐ŸŒ One shared goal: transforming education Letโ€™s talk about secure, scalable, and high-performance digital learning. ๐Ÿ‘‰ See you at Expo Cen..

bett_brazil_sao_paulo_2026_relianoid
Link
@koukibadr shared a link, 1ย week, 2ย days ago
Mobile Developer, Nventive

LiveData vs StateFlow

LiveData and StateFlow both stream data reactively, but differ in two key ways:

Initialization โ€” LiveData needs no initial value; StateFlow requires one.

Lifecycle โ€” LiveData is lifecycle-aware by default; StateFlow is not, so you need to wrap it in repeatOnLifecycle to avoid memory leaks.

Code templating
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide