When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
โ
Formal Methods
Flag this post
A Short Survey of Compiler Backends
โ
Formal Methods
Flag this post
Show HN: Why We're Building Creativity and Game Dev Clubs for Kids
๐Vulnerability Research
Flag this post
The Spegling Chronicles: Measuring dev shadow work until it measured us back
๐Vulnerability Research
Flag this post
Prentice Hall Interview with Rich Stevens, Author of Unix Programming (1997)
๐Cryptography
Flag this post
American Wind Farms
๐กSide-Channel Attacks
Flag this post
Show HN: I got Stability AI's small audio model into a consumer iOS app
๐Vulnerability Research
Flag this post
A Guide to My Organizational Workflow
โ
Formal Methods
Flag this post
How to CAD Almost Anything (2024)
๐จRendering
Flag this post
We found embedding indexing bottleneck in the least expected place: JSON parsing
๐กSide-Channel Attacks
Flag this post
Build your own GPG in Rust
๐Vulnerability Research
Flag this post
Autark: Rethinking build systems โ Integrate, Don't Outsource
๐Vulnerability Research
Flag this post
Show HN: Mongoose Studio: A Schema-Aware MongoDB GUI with AI Dashboards for Node
๐Zero-Knowledge Proofs
Flag this post
Document Chat System
๐Zero-Knowledge Proofs
Flag this post
Loading...Loading more...