Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท19hยท
Discuss: Hacker News
โšกHardware Acceleration
Three ways formally verified code can go wrong in practice
buttondown.comยท1h
๐Ÿ’ปProgramming languages
How to use tls_native TlsSocket if they cannot be split?
docs.rsยท22hยท
Discuss: r/rust
๐Ÿ“˜Typescript
From artificial atoms to quantum information machines: Inside the 2025 Nobel Prize in physics
theconversation.comยท50m
โš›๏ธPhysics
Experimenting with ACL2 and Claude Code
mikedodds.orgยท6hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Tokenization Firm Securitize Said to Be in Talks With Cantor SPAC
bloomberg.comยท3h
๐Ÿ”คTokenization
Patience and Willingness to Be Slow
lesswrong.comยท6h
๐Ÿช„Prompt Engineering
SSH Security: Why You Should Touch to Verify
ubicloud.comยท11hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
The Future of AI is Verifiable Thought
pub.towardsai.netยท1h
๐ŸŽญClaude
When mathematics meets aesthetics: Tessellations as a precise tool for solving complex problems
phys.orgยท2h
โœจCode Aesthetics
Quantum computing is "mission crtical"
federalnewsnetwork.comยท6hยท
Discuss: Hacker News
โณTech History
Looking at my Arduino
boswell.bearblog.devยท2h
๐Ÿ–ฅ๏ธHardware Architecture
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท5hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท9h
๐Ÿ”ฌRaBitQ
Size doesn't matter: Just a small number of malicious files can corrupt LLMs of any size
techxplore.comยท4h
๐Ÿ•ณLLM Vulnerabilities
๐Ÿ†” Step 1 - Digital ID Rollout
threadreaderapp.comยท6h
๐ŸทGTLDs
No Bullshit Guide to Statistics prerelease
minireference.comยท1h
๐Ÿ“ŠStatistical Ranking
Writing regex is pure joy. You can't convince me otherwise.
triangulatedexistence.mataroa.blogยท17hยท
๐Ÿ“‘Inverted Indexes
Linear Risk Sharing on Networks
freakonometrics.hypotheses.orgยท20h
๐ŸŒDistributed systems
The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”Hardware Security