Reaching out to Indonesia’s indigenous voices: WikiKathā
diff.wikimedia.org·14h
🌍Cultural Computing
Flag this post
The Information Is Reticent to Break Uncomfortable News
pxlnv.com·4h
📡RSS
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.com·3d
🔍Audio Forensics
Flag this post
Fearless dataset experimentation with bucket forking
tigrisdata.com·2d
🧬Bitstream Evolution
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.com·1d
🔓Hacking
Flag this post
What are you doing this weekend?
📊Static Analysis
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·2d
🌐DNS Security
Flag this post
Engineering a Rust optimization quiz
fasterthanli.me·11h
🦀Rust Macros
Flag this post
This Week In Techdirt History: October 26th – November 1st
techdirt.com·3h
📰RSS Archaeology
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
🔒Hardware Attestation
Flag this post
Don't Let It Fade: Preserving Edits in Diffusion Language Models via Token Timestep Allocation
arxiv.org·1d
🎯Gradual Typing
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·7h
🕵️Vector Smuggling
Flag this post
Building a Self-Improving RAG System with Smart Query Routing and Answer Validation
🔍Information Retrieval
Flag this post
Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet
🛡️WASM Sandboxing
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·1d
🧪Property-Based Testing
Flag this post
Loading...Loading more...