The funhouse mirror factory: How social media distorts perceptions of norms
sciencedirect.comยท12hยท
Discuss: Hacker News
๐Ÿ“ฐContent Curation
Flag this post
A collection of outlandish HCI papers
floe.butterbrot.orgยท3hยท
Discuss: Hacker News
๐Ÿ Homelab Archaeology
Flag this post
Nevada ransomware attack traced back to malware download by employee
cybersecuritydive.comยท2d
๐Ÿ”“Hacking
Flag this post
LangChain Open Deep Research Internals: A step-by-step guide
bolshchikov.comยท1dยท
Discuss: Hacker News
โš™๏ธProof Engineering
Flag this post
What data do coding agents send, and where to?
chasersystems.comยท5dยท
Discuss: Hacker News
๐ŸงชProtocol Fuzzing
Flag this post
Web content filters: what features do you look for?
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ“ฐRSS Feed Discovery
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.comยท4d
๐ŸŽซKerberos Attacks
Flag this post
๐Ÿง™ LLMs as Dungeon Masters: Can AI Run a Tabletop Game Without Cheating?
dev.toยท10hยท
Discuss: DEV
โš”๏ธLean Tactics
Flag this post
Giveaway Week 2025 โ€“ RAKwireless Blues.ONE LoRaWAN, LTE-M, and NB-IoT devkit
cnx-software.comยท22h
๐Ÿ”“Open Source Software
Flag this post
Tech With Tim: 7 Python Anti Patterns to Avoid
dev.toยท14hยท
Discuss: DEV
โš”๏ธLean Tactics
Flag this post
Tips & tricks for DIY lab
reddit.comยท1dยท
Discuss: r/homelab
โš™๏ธDIY Electronics
Flag this post
This Strange Particle May Hold Clues to the Universeโ€™s Biggest Secrets
scitechdaily.comยท2d
โฐTime Crystals
Flag this post
Winning at the Edges
holenventures.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
Flag this post
SonicWall blames state hackers for damaging data breach
techradar.comยท3d
๐Ÿ”“Hacking
Flag this post
Building an HTTP Server from TCP Sockets: 250 4,000 RPS
dev.toยท2dยท
Discuss: DEV
โšกgRPC
Flag this post
Tech With Tim: Learn Fast API With This ONE Project
dev.toยท1dยท
Discuss: DEV
๐ŸŽฌWebCodecs
Flag this post
Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems
securityaffairs.comยท2d
๐ŸŽซKerberos Exploitation
Flag this post
VeriCoT: Neuro-symbolic Chain-of-Thought Validation via Logical Consistency Checks
arxiv.orgยท2d
๐Ÿง Computational Logic
Flag this post
๐Ÿฏ Tiger MCP Blew My Mind โ€“ Here's the Visual Layer I'm Building to Complete It ๐Ÿ˜‡
dev.toยท9hยท
Discuss: DEV
โ›๏ธSQL Archaeology
Flag this post