Show HN: 1Pwned
๐Binary Exploitation
Flag this post
Conquering Complexity: Parallel Proof Search for Superhuman AI by Arvind Sundararajan
๐ญProgram Synthesis
Flag this post
The Transformer and the Hash
lesswrong.comยท2d
๐ณMerkle Trees
Flag this post
Built a simple C program that cracks hashed passwords (dictionary attack). Looking for feedback!
๐Binary Exploitation
Flag this post
I tested GPT-5.1 Codex against Sonnet 4.5, and it's about time Anthropic bros take pricing seriously.
๐ฆFolly
Flag this post
Attention really is all you need โ The Encoder
pub.towardsai.netยท1h
๐คTransformers
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
๐ขHomomorphic Encryption
Flag this post
Show HN: Mathematical parameter selection to eliminate synchronization bugs
๐Vector Clocks
Flag this post
Smoothsort Demystified
โกQuicksort
Flag this post
Why isnโt Rust getting more professional adoption despite being so loved?
๐ท๏ธMemory Tagging
Flag this post
One Weird Hashing Trick
๐งฎVector Databases
Flag this post
Coinbase Ventures-Backed Supra Offers $1M Bounty to Beat Its Parallel EVM Execution Engine
hackernoon.comยท1d
๐Performance
Flag this post
Solving Project Euler #45
๐Dynamic Programming
Flag this post
Strategic Opponent Modeling with Graph Neural Networks, Deep Reinforcement Learning and Probabilistic Topic Modeling
arxiv.orgยท2d
๐ฎGame Theory
Flag this post
Node.js Security Checklist
๐Security
Flag this post
Loading...Loading more...