Becoming a Core Developer
stefaniemolin.com·10h
🔍Static Analysis
Flag this post
Writing an Asciidoc Parser in Rust: Asciidocr
🦀Rust
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
🧩Theorem Proving
Flag this post
kadena-io/pact-5
github.com·2h
👐Open Source Software
Flag this post
A unified threshold-constrained optimization framework for consistent and interpretable cross-machine condition monitoring
sciencedirect.com·1d
🎲Probabilistic Programming
Flag this post
Speedrunning an RL Environment
⚙Functional Programming
Flag this post
Online Identity Is Evolving: From Data Storage to Proof-Based Verification with zkTLS
blogger.com·1d
🔐Cryptography
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·3d
🧮Programming Language Theory
Flag this post
Project 2
🤝Protocol Design
Flag this post
The Best Steve Yegge Posts (2015)
sam-koblenski.blogspot.com·1h
🧮Programming Language Theory
Flag this post
Computational Complexity and Explanations in Physics
gilkalai.wordpress.com·5h
🔐Cryptography
Flag this post
Protest: An ergonomic, powerful, and feature-rich property testing library with minimal boilerplate.
MCP standard
🤝Protocol Design
Flag this post
The Hidden DNA of LLM-Generated JavaScript: Structural Patterns EnableHigh-Accuracy Authorship Attribution
🧮Programming Language Theory
Flag this post
Proving Authenticated Key Exchange via Memory-Efficient Reductions
eprint.iacr.org·4d
🔐Cryptography
Flag this post
Patterns for Defensive Programming in Rust
🦀Rust
Flag this post
Loading...Loading more...