Devpost
Participate in our public hackathons
Devpost for Teams
Access your company's private hackathons
Grow your developer ecosystem and promote your platform
Drive innovation, collaboration, and retention within your organization
By use case
Blog
Insights into hackathon planning and participation
Customer stories
Inspiration from peers and other industry leaders
Planning guides
Best practices for planning online and in-person hackathons
Webinars & events
Upcoming events and on-demand recordings
Help desk
Common questions and support documentation
Cyber Threat Hunter/Information Security Analyst for a financial institution
Stay safe, self-monitor, and take care.
Internet trolls seek to create chaos on social media spreading misinformation. For this issue, I worked on developing a deep learning model that detects if post/comment is from a troll or not.
Lost and no internet signal? Text us for directions!
Protect you and others without even thinking about it.
This is an implementation of the ChaCha20 cipher as a Linux Kernel Module as specified in RFC 8439