Tera FMTera FM
Dev.to·Sunday, December 21, 2025

Dev.to - Sunday, December 21, 2025

10 stories~15 min

Listen to this episode

Hear all 10 stories summarized and read aloud.

Play on Tera.fm

Stories Covered

01

Counterfactual Explanations without Opening the Black Box: Automated Decisionsand the GDPR

How to Ask Why an Algorithm Said No — GDPR and Counterfactual Explanations Algorithms now decide things like loans, jobs, and offers. GDPR, gives people some rights to know why. counterfactual explanations. smallest change you could make to get a different result — for example, a slightly higher income or a missing document — without explaining how the machine thinks. Read article comprehensive review in Paperium.net: Counterfactual Explanations without Opening the Black Box: Automated Decisi

02

Built a 32D Emotional State Tracking system for transparent ethical AI - Now open source (GPLv3)

What I Built Project North Star - An ethical AI framework with 32-dimensional emotional state tracking and transparent internal processing. Live demo in GitHub Codespaces: [https://github.com/palman22-hue/Project-North-Star] Current AI systems are black boxes. This framework makes the AI's internal emotional state visible in real-time, allowing users to see: Current coherence level (0-1) Active emotions across 32 dimensions Transparent decision-making process Started with: ModuleNotFoundError

03

RTO, Return To On-premise

How we got there The advantage of moving to the cloud was always clear: no big CAPEX, just a monthly fee and someone else will provide the compute, the network and everything else. As CTOs began to propose “lift and shift” strategies with an almost Pavlovian response, cloud adoption became the default setting, turning into a buzzword that eventually numbed us. We forgot that, at the end of the day, we were simply running our businesses on someone else's computer. This numbness is usually inter

05

A Day in My Life as a Backend Developer

The Bug That Looked Simple… Until It Wasn’t The Usual Morning “Fix inconsistency caused by two DB calls running together.” That’s it. One sentence. The kind of bug you feel you can finish before lunch. Diving Into the Problem Once I got clarity, I opened the code. And bhai… it was a jungle. Still, I took a deep breath and began untangling it. First Fix… First Rejection Within minutes, feedback came. “Logic sahi hai… but make it more optimized.” In simple words: I sat back in my chair, smiled, an

06

ECR-creds-refresher

Generally, the following are the main methods to authenticate to a private registry in order to be able to pull images from it: Configuring the container runtime on each node, i.e. k3s checks if /etc/rancher/k3s/registries.yaml file exists, to retrieve the registry configuration when generating the containerd configuration to authenticate to the private registry. Using a kubelet credential provider plugin to dynamically fetch credentials for private registries. (configure the kubelet to invoke

07

Beyond the Block: Why our L2 uses a Hybrid DAG + PQ-Keys

"Day 5 of building the Roadmap to Resilience. Most L2s face a trilemma, but we’re solving for a fourth pillar: Quantum Resistance. ​In today’s update, I’m diving into how we maintained EVM compatibility while swapping standard ECDSA for Post-Quantum (PQ) keys. By using a Lattice-based structure, we aren’t just increasing throughput; we’re future-proofing the ledger against Shor’s algorithm. ​Key takeaway for devs: You can deploy your Solidity contracts today and get PQ-security 'for free' on our

08

Testing Digital Accessibility in Bangladesh: A UX Review of Joya 9 (2025)

As part of my research into mobile-first platforms in emerging markets, I recently conducted a hands-on usability test of Joya 9, a platform frequently used for online gaming and sports betting in Bangladesh. While the service operates in a legally unregulated space, its technical execution offers valuable insights for developers building for low-bandwidth, high-latency environments with cash-based payment systems. This is not an endorsement — just a neutral analysis of user experience, design c

09

Modern Web Authentication Security: JWT, Cookies, CSRF, and Common Developer Mistakes

A practical guide to understanding authentication security - what breaks, why it breaks, and how attackers exploit it. Authentication is where trust begins. If it fails, nothing else matters - not your encryption, not your firewall, not your fancy security tools. Your front door can have the best lock in the world, but if someone can copy your key or trick you into opening it, the lock doesn't matter. Authentication failures consistently rank in the OWASP Top 10. Common issues include: Weak pass

10

Reflection of Co-Learning Mantle week 2

After week 1 we learning about basic of Solidity and how to make and deploy smart contract, now we learn about Real World Asset (RWA). At its core, Real World Assets (RWA) are digital representations of physical or financial assets (like real estate, gold, or government bonds) on the blockchain. This process is called tokenization. The most exciting part for me was seeing how RWA solves "old world" problems. In Traditional Finance (TradFi), investing in a commercial building requires millions of

Tera.fm - AI-powered internet radio