De Bruijn Numerals
text.marvinborner.de·2d·
Discuss: Hacker News
λLambda Calculus
Flag this post
Understanding How Computers Actually Work
dev.to·9h·
Discuss: DEV
📦Compact Data
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.com·22h
🛡️Security Type Systems
Flag this post
The Abode of Salvation
rohanparanjpe.substack.com·1d·
Discuss: Substack
🐹Minimal Go
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️Security Type Systems
Flag this post
NetBSD NAT64 Protocol Translation Enhancements Part 2
discoverbsd.com·7h
📡Binary Protocols
Flag this post
Timing Attacks: Extracting Secrets One Microsecond at a Time ⏱️
instatunnel.my·5d·
Discuss: r/devops
🔗Hash Algorithms
Flag this post
The cryptography behind electronic passports
blog.trailofbits.com·1d·
Discuss: Hacker News
🛡️Security Type Systems
Flag this post
Guide: Self-hosting and automating music with slskd, gonic, wrtag, traefik from scratch
blog.0007823.xyz·1d·
Discuss: r/selfhosted
🏠indieweb
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·6h
📏Linear Memory
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.com·2d·
Discuss: Substack
🌐Network Protocols
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·1d
🎲Property Testing
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.com·1d
🛡️Taint Analysis
Flag this post
Signal’s Post-Quantum Cryptographic Implementation
schneier.com·3d·
Discuss: Hacker News
📡Binary Protocols
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·1d
🛡️Parser Security
Flag this post
Discovering JavaScript's Hidden Secrets: Understanding String Matching Algorithms.
dev.to·2d·
Discuss: DEV
🔤String Algorithms
Flag this post
Speedrunning an RL Environment
sidb.in·10h·
Discuss: Hacker News
Gleam
Flag this post
Q&A #80 (2025-10-31)
computerenhance.com·18h
📚Stack Allocation
Flag this post
Guide: TLS and QUIC
moq.dev·1d·
Discuss: Hacker News
🛡️Security Type Systems
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐Network Protocols
Flag this post