De Bruijn Numerals
λLambda Calculus
Flag this post
Understanding How Computers Actually Work
📦Compact Data
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.com·22h
🛡️Security Type Systems
Flag this post
The Abode of Salvation
🐹Minimal Go
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️Security Type Systems
Flag this post
NetBSD NAT64 Protocol Translation Enhancements Part 2
discoverbsd.com·7h
📡Binary Protocols
Flag this post
Guide: Self-hosting and automating music with slskd, gonic, wrtag, traefik from scratch
🏠indieweb
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·6h
📏Linear Memory
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·1d
🎲Property Testing
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.com·1d
🛡️Taint Analysis
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·1d
🛡️Parser Security
Flag this post
Discovering JavaScript's Hidden Secrets: Understanding String Matching Algorithms.
🔤String Algorithms
Flag this post
Speedrunning an RL Environment
✨Gleam
Flag this post
Q&A #80 (2025-10-31)
computerenhance.com·18h
📚Stack Allocation
Flag this post
Guide: TLS and QUIC
🛡️Security Type Systems
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐Network Protocols
Flag this post
Loading...Loading more...