Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
blog.shodipoayomide.com·11h·
Discuss: Hacker News
🔢Homomorphic Encryption
Flag this post
How We Measure: IPv6
potaroo.net·14h·
Discuss: Hacker News
📡P4
Flag this post
The Plain Text Manifesto
plaintextmanifesto.eu·20h·
Discuss: Hacker News
🔒Digital Privacy
Flag this post
Tour of a pattern matcher: expression and pattern expansion
crumbles.blog·6h·
🦀Rust Macros
Flag this post
Claude Code hooks are crazy
augmentedswe.com·17h·
Discuss: Hacker News
💻CLI Tools
Flag this post
A new quantum toolkit for optimization
research.google·23h·
Discuss: Hacker News
⚛️Quantum Computing
Flag this post
Probability-Biased Attention over Directed Bipartite Graphs for Long-Tail ICD Coding
arxiv.org·2h
🕸️GraphBLAS
Flag this post
Designing Blockchain #2: Accounts and State
dev.to·2d·
Discuss: DEV
🌳Merkle Trees
Flag this post
History-Aware Reasoning for GUI Agents
arxiv.org·1d
📊Datalog
Flag this post
Generalisable prediction model of surgical case duration: multicentre development and temporal validation
arxiv.org·1d
🧠Machine Learning
Flag this post
Reputation assimilation mechanism for sustaining cooperation
arxiv.org·2h
🎯Quorum Systems
Flag this post
A Tensor Residual Circuit Neural Network Factorized with Matrix Product Operation
arxiv.org·1d
🧮Vector Databases
Flag this post
I/O Multiplexing
dev.to·50m·
Discuss: DEV
🔄epoll
Flag this post
From Pandas to Upstream Control: The Evolution PyData Needs Next
dev.to·2d·
Discuss: DEV
🗄️Database Sharding
Flag this post
Time Necromancy: Python Scripts That Resurrect Lost Hours
dev.to·9h·
Discuss: DEV
🤖Automation
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.net·1d·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
2025
dev.to·1d·
Discuss: DEV
☁️Cloud Computing
Flag this post
Evaluation Avoidance: How Humans and AIs Hack Reward by Disabling Evaluation Instead of Gaming Metrics
lesswrong.com·6h
⏭️Skip Lists
Flag this post