Wipers from Russia’s most cut-throat hackers rain destruction on Ukraine
arstechnica.comΒ·2dΒ·
Discuss: Hacker News
πŸ“‘Side-Channel Attacks
Flag this post
Show HN: VitalLens 2.0 – A new SOTA rPPG model for HRV estimation from video
rouast.comΒ·2hΒ·
Discuss: Hacker News
πŸ“‘Side-Channel Attacks
Flag this post
Taking a look at Steam's download and preload system (2020)
steamdb.infoΒ·1dΒ·
Discuss: Hacker News
πŸ“‘Side-Channel Attacks
Flag this post
Whole World Holonomy
galileo-unbound.blogΒ·2dΒ·
Discuss: Hacker News
🎨Rendering
Flag this post
Show HN: TabPFN-2.5 – SOTA foundation model for tabular data
priorlabs.aiΒ·2dΒ·
Discuss: Hacker News
βœ…Formal Methods
Flag this post
Antropocene
feralatlas.orgΒ·2dΒ·
Discuss: Hacker News
🎨Rendering
Flag this post
Dive into Systems
diveintosystems.orgΒ·5dΒ·
Discuss: Hacker News
πŸ›Vulnerability Research
Flag this post
Advice for System Design Interviews
jacobbrazeal.wordpress.comΒ·2dΒ·
Discuss: Hacker News
βœ…Formal Methods
Flag this post
The 1337 PNG Hashquine (2022)
hackaday.comΒ·4dΒ·
Discuss: Hacker News
πŸ›Vulnerability Research
Flag this post
The state of SIMD in Rust in 2025
shnatsel.medium.comΒ·3dΒ·
πŸ¦€Rust
Flag this post
Run LLMs Locally
ikangai.comΒ·3dΒ·
Discuss: Hacker News
πŸ“‘Side-Channel Attacks
Flag this post
BoxLambda OS Software Architecture, First Draft
epsilon537.github.ioΒ·3dΒ·
Discuss: Hacker News
βœ…Formal Methods
Flag this post
Google's MCP Toolbox for Databases: A Technical Deep Dive for Engineering Teams
agnost.aiΒ·2dΒ·
Discuss: Hacker News
πŸ“‘Side-Channel Attacks
Flag this post
Planning > Agents: Getting Reliable Code from LLMs
repoprompt.comΒ·3dΒ·
Discuss: Hacker News
βœ…Formal Methods
Flag this post
Critical UniFi OS Flaw Enables Remote Code Execution
gbhackers.comΒ·4dΒ·
Discuss: Hacker News
πŸ“‘Side-Channel Attacks
Flag this post
Coding on Paper
thepalindrome.orgΒ·2dΒ·
Discuss: Hacker News
πŸ¦€Rust
Flag this post
Show HN: Solv – Stateless Offline-capable LiveView – Prototype 03
github.comΒ·1dΒ·
πŸ¦€Rust
Flag this post
Complexity fills the space it's given
wilsoniumite.comΒ·2dΒ·
Discuss: Hacker News
πŸ›Vulnerability Research
Flag this post
What data do coding agents send, and where to?
chasersystems.comΒ·4dΒ·
Discuss: Hacker News
πŸ›Vulnerability Research
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.ioΒ·2dΒ·
Discuss: Hacker News
πŸ›Vulnerability Research
Flag this post