Sources of (mostly) technical (mostly long and worthwhile) reads
- Fabricated Knowledge - stocks
- The Wall Street Journal - markets/news
- The Atlantic - essays/US
- The Chronicle of Higher Education - news/academia
- The Conversation - news/academia
- The Economist - news/international
- Foreign Affairs - essays/international
- Foreign Policy - essays/international
- The New York Times - news/US
- New York Magazine - news/US
- ProPublica - news
- Reuters - news
- Semafor - news
- The Washington Post - news/US
- American Scientist - news/research
- New Scientist - news/research
- Science - research/news
- Android developers blog - Android
- Apple security research - iOS/macOS
- The Desolation of Blog - Mac/macOS
- Electric Light Company blog - Mac/macOS
- Fedora Magazine - Fedora
- FreeBSD Journal - FreeBSD
- InfluxData Blog - InfluxDB
- Klara Systems blog - FreeBSD
- Last Week in AWS - AWS
- LWN - Linux
- Microsoft Networking Blog - Windows
- Now in Android - Android
- OpenBSD Journal - OpenBSD
- OpenBSD Webzine - OpenBSD
- OSnews - Unix/Windows
- Planet Debian - Debian
- Daniel Stenberg's blog - curl
- Tor Blog - Tor
- Accenture cybersecurity - analysis/research
- Akamai Blog - analysis
- Amnesty International Security Lab - analysis
- AT&T cybersecurity blog - analysis
- AWS security blog - analysis
- Bellingcat blog - analysis
- C-skills - analysis/software
- Adam Caudill's blog - opinion/analysis
- CISA resources - analysis
- Citizen Lab research - privacy/analysis
- The Cloud Security Reading List - news
- Corelight Blog - analysis
- cryptologie - crypto
- CTO at NCSC - Cyber Defence Analysis - news
- cybersec - analysis/opinion
- CyberScoop - news
- DataBreaches.net - news
- Decipher - news
- Detection Engineering - news/analysis
- The DFIR Report - analysis
- Digital Investigations - news
- Didier Stevens - analysis/software
- DomainTools Blog - analysis
- Errata Security - opinion/news
- ESET welivesecurity - analysis
- Feisty Duck newsletter - crypto
- A Few Thoughts on Cryptographic Engineering - crypto
- Geant R&E cybersec newsletter - news
- GitHub Security Lab - analysis
- Google Project Zero - analysis/research
- Google Security blog - analysis/news
- Google Threat Analysis Group blog - analysis
- Greynoise blog analysis/malware
- grugq's newsletter - news/analysis
- The Hacker Factor - analysis
- ImperialViolet - crypto
- InfoSec Handlers Diary Blog - analysis
- JISC blog - analysis/opinion
- Krebs on Security - news
- Light Blue Touchpaper - analysis/research
- The Lucid Privacy Group blog - privacy/security
- Lumen Black Lotus Labs - analysis
- Malwarebytes Labs blog - analysis/news
- MANRS blog - routing
- Microsoft Malware Protection Center - malware/analysis
- Microsoft Security Response Center - systems/analysis
- NCC Group Research - analysis/research
- NETSCOUT's ASERT Blog - analysis
- NIST CSRC publications - security/analysis
- Orange Cyber Defense Blog - analysis
- Wladimir Palant's blog - web/crypto
- Palo Alto Networks Unit42 blog - malware/analysis
- PortSwigger research - analysis/research
- Public Exposure - analysis
- The Record - news
- Recorded Future research - analysis
- The Red Canary Blog - malware/analysis
- reddit /r/netsec - news
- RISKS - news
- Risky Business News - news
- Schneier on Security - opinion/news
- Security Trails Blog - analysis
- Shadowserver news/insight - analysis/malware
- Shostack + Associates blog - analysis
- Soatok's blog - crypto
- CMU SEI publications - analysis/research
- Spamhaus News - malware/analysis
- Emily M. Stark's blog - analysis
- Stranded on Pylos - analysis/opinion
- Team Cymru Blog - analysis
- Tenable Tech Blog - analysis
- this week in security - news
- tl;dr sec - news
- TorrentFreak - privacy
- Trend Micro Research
- 41J Blog - hardware/bioinformatics
- ACM Computing Surveys - research/analysis
- ACM TechNews - news
- Daniel Aleksandersen's blog - systems/programming
- wesley Aptekar-Cassels blog - systems/programming
- arXiv.org - research
- Attack of the 50 Foot Blockchain - news/analysis
- B2fxxx - law
- John Batelle's Search Blog - news/analysis
- Steve Bellovin's Blog - opinion
- Benjojo's Blog - networking/systems
- Robert Berjon's blog - privacy/opinion
- Berkman Center - law/research
- bit-player - mathematics
- Arturo Borrero's blog - software
- Matt Brown's blog - software/systems
- Center for Democracy & Technology - policy/analysis
- Center for Internet Security and Society blog - law
- Center for Security and Emerging Technology - policy/analysis
- CERIAS Blog - news/opinion
- CeroWrt blog - networking/systems
- CircleID - news/opinion
- Cloudflare Blog - systems/security
- codingpackets.com Blog - systems
- Communications of the ACM - news/research
- COMPUTERS ARE BAD - security/history
- Ariadne Conill's blog - systems/programming
- Mike Conlow's newsletter - analysis/policy
- Albert Cory aka Bob Purvy's blog - history/opinion
- CTRL Forward - policy/analysis
- Cybereagle - law
- Daily Host News - news
- Data Center Frontier -news
- decoded.legal blog - law
- Drew DeVault's blog - systems/programming
- Educated Guesswork - systems/security
- EDUCAUSE Blogs - news
- EFF Deep Links - news/policy
- Engineering at Meta - software/systems
- Julia Evans - programming/systems
- Fastly Blog - systems/security
- The Fediverse Report - software/news
- First Monday - research/analysis
- Firstyear's blog-a-log - software/analysis
- Freedom to Tinker - research/opinion
- Jeff Geerling's blog - software/hardware
- Brendan Gregg's Blog - systems
- Hacker News - news
- Hacking, but Legal - analysis/opinion
- HealthChecks.io blog - analysis
- Bert Hubert's articles - science/opinion
- IEEE Annals of the History of Computing - analysis
- IEEE Spectrum - news
- Interesting-People - news
- Internet Society Blog - news
- Internet Society Pulse - analysis/news
- Internet2 News & Blogs - news
- IT Notes - systems/software
- Robert Kisteleki's blog - networking/software
- Mallory Knodel's blog - opinion/policy
- Lawfare - law/policy
- lcamtuf's thing - analysis
- Dan Luu's blog - analysis
- MTU Ninja - systems
- Mystery AI Hype Theatre 3000: The Newsletter - analysis/AI
- net.wars - opinion
- Netflix Techblog - software/systems
- Netcraft News - analysis
- Lukasz Olejnik's blog - opinion/analysis
- O'Reilly Radar - analysis/programming
- Swapneel Patnekar's blog - analysis
- Pew Research Center - analysis/research
- Planet Grep - systems/software
- Pluralistic - links/news
- Hal Pomeranz's blog - systems
- POTs and PANs - analysis/opinion
- Research at Google - research/analysis
- Rest of World - news/analysis
- Rob Seastrom's Technotes - security/systems
- Chris Siebenmann's blog - analysis/opinion
- Signs of Trivialty - sysadmin/analysis
- Slashdot - news/opinion
- Michael Stapelberg's blog - systems
- Techjournalist - analysis
- Tech Policy Press - analysis/opinion
- Technology and Marketing Law blog - law/analysis
- Telecom Expert - analysis
- Telia Carrier Blog - networking
- Laurence Tratt blog - opinion/programming
- Warner's Random Hacking Blog - systems/programming
- Weberblog.net - networking/security
- Ben Werdmuller's blog - opinion
- Wikimedia tech blog - systems/networking
- Russ White's feedly - news
- Wired - news
- Yes that Blog - systems/opinion
- Dan York's blog - news/opinion
- Ed Zitron's blog - opinion/analysis
- ACM SIGCOMM - research
- Andree's Musings - engineering/analysis
- APNIC Blog - analysis
- Anurag Bhatia's blog - analysis/routing
- ARPA Playbook newsletter - history
- Stephane Bortzmeyer's blog - protocols
- CableLabs blog - protocols/engineering
- CAIDA - research/analysis
- CENIC blog - engineering/research
- Jim Cowie's blog - analysis
- CZ.NIC Staff Blog - protocols/analysis
- Daniel Dib's blog - routing/devops
- The Forwarding Plane - engineering/protocols
- Christian Huitema's blog - protocols
- ICANN blog - news
- ICANN OCTO publications - analysis
- ICSI - networking/security
- IEEE Communications Surveys & Tutorials
- IEEE Transactions on network and Service Management
- IETF News and Blog - protocols/news
- IETF RFCs - protocols
- The Internet Protocol Blog - IPv6
- The Internet Protocol Journal - protocols
- IPng Networks articles - protocols/systems
- ipSpace blog - news/anlaysis
- The ISP Column - analysis/research
- Irresponsible Disclosure - protocols/security
- Kentik Blog - analysis/protocols
- Justin Wilson's blog - routing
- John Kristoff's blog - protocols/security
- Marikku Leinio's blog - protocols
- Jan-Piet Mens archives - DNS/systems
- Monash IP Observator - analysis
- Nick Merrill's blog - policy/analysis
- Network Fun Times - routing/protocols
- NLnet Labs Blog - protocols/software
- Mark Nottingham's blog - policy/protocols
- Packet Pushers blog - protocols
- Julio Perez's Blog - routing/protocols
- Fabrizzio Petrucci's blog - routing/protocols
- Qrator Labs Blog - routing/analysis
- RIPE Labs - analysis
- SIDN Labs news and blog - protocols/news
- Dig Singh's blog - protocols
- SubTel Forum - engineering/systems
- Daryll Swer's blog - routing/protocols
- Systems Approach Newsletter - protocols/analysis
- TeleGeogrpahy Blog - analysis/news
- ThousandEyes Blog - analysis
- USENIX - research/analysis
- Rudolf Van Der Berg's blog - analysis/policy
- Mingwei Zhang's articles - routing/protocols
- Amos' writings - Rust
- <antirez> - redis
- blogs.perl.org - Perl
- Bramus Van Damme's blog - web development
- The Go BLog - Go
- Jupyter Blog - Juypter
- Mark Needham's blog - Python/database
- Mouse vs. Python - Python
- Network to Code blog - automation
- The New Stack - software development
- The Old New Thing - Windows
- Perl Weekly - Perl
- Planet Python - python
- RCE Endeavors - reversing
- Ruby Weekly - Ruby
- Sutter's Mill - C++
- This Week in Rust - Rust
- Sebastian Witowski Blog - Python