Show HN: Mathematical parameter selection to eliminate synchronization bugs
🕐Vector Clocks
Flag this post
Built a simple C program that cracks hashed passwords (dictionary attack). Looking for feedback!
🔓Binary Exploitation
Flag this post
I tested GPT-5.1 Codex against Sonnet 4.5, and it's about time Anthropic bros take pricing seriously.
📦Folly
Flag this post
Unlocking the Unsolvable: Parallel Search Algorithms Conquer Complexity by Arvind Sundararajan
🔍Fractional Cascading
Flag this post
Why isn’t Rust getting more professional adoption despite being so loved?
🏷️Memory Tagging
Flag this post
The “Jankiest” way of writing Ruby gems
mauricio.szabo.link·2h
🔵Clojure
Flag this post
The Transformer and the Hash
lesswrong.com·2d
🌳Merkle Trees
Flag this post
Slice-Aware Spoofing Detection in 5G Networks Using Lightweight Machine Learning
arxiv.org·2d
🔐WireGuard
Flag this post
Node.js Security Checklist
🔒Security
Flag this post
Smoothsort Demystified
⚡Quicksort
Flag this post
Show HN: 1Pwned
🔓Binary Exploitation
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
🔢Homomorphic Encryption
Flag this post
Advanced Fault Injection Analysis via Bayesian Deep Learning for Side-Channel Resilience
💬Prompt Engineering
Flag this post
EP189: How to Design Good APIs
blog.bytebytego.com·14h
🎨API Design
Flag this post
Loading...Loading more...