[Deep Dive] How We Solved Poker: From Academic Bots to Superhuman AI (1998-2025)
🧱Firewalls
Flag this post
What are computers for, anyway?
forum.merveilles.town·2d
💻Computer Science
Flag this post
Undefined Tasks
thedailywtf.com·3d
🔬Reverse Engineering
Flag this post
AI reasoning models that can ‘think’ are more vulnerable to jailbreak attacks, new research suggests
fortune.com·6h
🎯Penetration Testing
Flag this post
10 Smart Performance Hacks For Faster Python Code
blog.jetbrains.com·2d
🐍Python
Flag this post
Whisper Leak: A novel side-channel attack on remote language models
microsoft.com·11h
🦠Malware Analysis
Flag this post
I’ve indexed all Strange Loop conference talks so you can use semantic search to find relevant videos
💻Computer Science
Flag this post
You Should Write An Agent
🐍Python
Flag this post
How I Leverage LLMs
🐍Python
Flag this post
Moving From C++ to Rust? Clickhouse Has Some Advice
thenewstack.io·2d
🔬Reverse Engineering
Flag this post
Readable Code Is Unreadable
🐍Python
Flag this post
Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
thehackernews.com·10h
🦠Malware Analysis
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·3d
🦠Malware Analysis
Flag this post
[Tool] RE-Architect: Automated binary analysis with multiple decompilers + AI explanations
🔬Reverse Engineering
Flag this post
FEX-Emu/FEX FEX-2511
github.com·2d
🐧Linux
Flag this post
Loading...Loading more...