Ask HN: What's a Purchase You Regret?
news.ycombinator.comยท19hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Boring Company fined nearly $500K after it dumped drilling fluids into manholes
yahoo.comยท2hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Spinning Plates
dylanamartin.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Show HN: I made a better DOM morphing algorithm
joel.drapper.meยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
AI-Induced Psychosis as Existential Risk Lower Bound
flocrivello.comยท4hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Readtape: Decode the analog waveform extracted from old computer mag tapes
github.comยท17hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Python's GIL removal is a poison pill and benefits Mojo
theserverside.comยท17hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Recursive macros in C, demystified (once the ugly crying stops)
h4x0r.orgยท3dยท
๐Ÿ”’security
Flag this post
AiDHD: Reflecting on 6 Months Vibing
josh.ingยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
swww renamed to awww, due to the author's guilt from obliviously naming it "final solution"
lgfae.comยท1dยท
๐Ÿ”’security
Flag this post
Show HN: Elden Stack โ€“ A mini game where your stack overflows in glorious combat
github.comยท2dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
github.comยท5dยท
๐Ÿ”’security
Flag this post
The R47: A new physical RPN calculator released today in 2025
swissmicros.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Doo: A Simple, Fast Programming Language Built on Rust and LLVM
news.ycombinator.comยท5dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Modern Optimizers โ€“ An Alchemist's Notes on Deep Learning
notes.kvfrans.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
A SQLite extension for the crazy ones because everything could be a database
kruzenshtern.orgยท2dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Non-recursively deleting a binary tree in constant space: Restructuring the tree
devblogs.microsoft.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Google Summer of Code 2025 Reports: Using bubblewrap to add sandboxing to NetBSD
blog.netbsd.orgยท10hยท
๐Ÿ”’security
Flag this post
Garbage Collection Is a Hack
blog.adamant-lang.orgยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.ioยท3dยท
๐Ÿ”’security
Flag this post