Feeds to Scour
SubscribedAll
Scoured 72593 posts in 2.61 s
Dealing with alternatives
jemarch.netยท1d
๐Ÿท๏ธPointer Tagging
Preview
Report Post
Sockpuppetting: Jailbreaking LLMs Without Optimization Through Output Prefix Injection
arxiv.orgยท15h
๐Ÿ”’BPF LSM
Preview
Report Post
Randomization in Typst
idraluna-archives.bearblog.devยท1h
๐ŸŽฒDeterministic Simulation
Preview
Report Post
CodeSOD: Validation Trimmed Away
thedailywtf.comยท14h
๐ŸŽฒQuickcheck
Preview
Report Post
MLSN #18: Adversarial Diffusion, Activation Oracles, Weird Generalization
lesswrong.comยท1d
๐Ÿ›ก๏ธAI Security
Preview
Report Post
Designing a Programming Language for the Desert
futhark-lang.orgยท4hยท
Discuss: Hacker News
๐Ÿ”จIncremental Compilation
Preview
Report Post
Bypassing Gemma and Qwen safety with raw strings
teendifferent.substack.comยท2dยท
Discuss: Substack
๐Ÿ”“Binary Exploitation
Preview
Report Post
Scientific Computing in Rust Monthly #14
scientificcomputing.rsยท8h
๐Ÿฆ€Rust Macros
Preview
Report Post
InfoSec News Nuggets
aboutdfir.comยท6h
๐Ÿฆ…Falco
Preview
Report Post
Making Hidden States Visible
link.aps.orgยท20h
โš›๏ธQuantum Computing
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.ioยท22h
๐Ÿ“ŠCriterion.rs
Preview
Report Post
Simple Sudoku Solvers SII, EI: Dyalog APL
blog.veitheller.deยท1d
๐ŸงฉConstraint Programming
Preview
Report Post
Prompt injection in Perplexity BrowseSafe model highlights threats of single-model protection systems
bdtechtalks.substack.comยท1d
๐Ÿ›ก๏ธAI Security
Preview
Report Post
The Helpful Adversary
dev.toยท19hยท
Discuss: DEV
๐Ÿ”“Binary Exploitation
Preview
Report Post
Google Releases FunctionGemma Model
i-programmer.infoยท4h
๐Ÿฆ™Ollama
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comยท8h
๐Ÿ”ฌStatic Analysis
Preview
Report Post
**Abstract:** This paper presents a novel system, โ€œLexiGuard,โ€ for automated review and anomaly detection within large-scale collaborative LaTeX ...
freederia.comยท1d
๐Ÿ”Meilisearch
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.comยท5h
๐Ÿ—œ๏ธRoaring Bitmaps
Preview
Report Post
Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
thehackernews.comยท11h
๐Ÿ›ก๏ธAI Security
Preview
Report Post
jslinux/jslinux: JSLinux rewritten to be human readable, hand deobfuscated and annotated.
github.comยท1d
โš™๏ธSWC
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help