chs's Top FindsLoading...
Using recursion to establish VPN connection to my network
preview.redd.it·7h·
Discuss: r/shortcuts
Flag this post
What does the end of the Global Interpreter Lock mean for Python?
blog.adafruit.com·14h
Flag this post
Proving Safety at Scale: Spark, RISC-V, and Nvidia's Security Strategy
blog.adacore.com·14h·
Discuss: Hacker News
🔒Computer Security
Flag this post
COOL NAMED SPORTS TEAM: NUNEZ COLLEGE
glitternight.com·9h
Flag this post
Intrusion (INTZ) Q3 2025 Earnings Call Transcript
fool.com·7h
Flag this post
Spy chief warns of China espionage threat to business, critical infrastructure
abc.net.au·5h
Flag this post
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper
pberba.github.io·1d
🔒Computer Security
Flag this post
Deep Learning for Molecules and Materials
dmol.pub·1d·
Discuss: Hacker News
Flag this post
Screw Waiting for the Next Election, We Need These Traitors out NOW
reddit.com·9h·
Discuss: r/50501
Flag this post
How to Build a Custom MCP Server to Read Local Files with Claude Desktop: Challenges & Solutions
pub.towardsai.net·19h
Flag this post
Distributed Deep Learning for Medical Image Denoising with Data Obfuscation
arxiv.org·1d
Flag this post
U.S. Senate Sen. Bill Cassidy R-LA on Health Care and Gov't Shutdown : CSPAN2 : November 11, 2025 10:10am-10:36am EST
archive.org·14h
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Vibe Code Warning – from 1k to 10k lines, a personal casestudy
github.com·1d·
Discuss: Lobsters
🔒Computer Security
Flag this post
Potential virus
reddit.com·2d·
Discuss: r/computers
🔒Computer Security
Flag this post
From Frustration to Protection: The Logic of Secure Coding
dev.to·1d·
Discuss: DEV
🔒Computer Security
Flag this post
Is my data safe if I use Loom??
reddit.com·21h·
Discuss: r/privacy
Flag this post
Conceptual reasoning dataset v0.1 available (AI for AI safety/AI for philosophy)
lesswrong.com·4h
Flag this post
How AI Fails: An Interactive Pedagogical Tool for Demonstrating Dialectal Bias in Automated Toxicity Models
arxiv.org·1d
Flag this post
U.S. CISA adds Samsung mobile devices flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·20h
🔒Computer Security
Flag this post
Thick practices for AI tools
lesswrong.com·16h
Flag this post