Reaching out to Indonesia’s indigenous voices: WikiKathā
diff.wikimedia.org·14h
🌍Cultural Computing
Flag this post
The Information Is Reticent to Break Uncomfortable News
pxlnv.com·4h
📡RSS
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.com·3d
🔍Audio Forensics
Flag this post
Fearless dataset experimentation with bucket forking
tigrisdata.com·2d
🧬Bitstream Evolution
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.com·1d
🔓Hacking
Flag this post
What are you doing this weekend?
lobste.rs·1d·
Discuss: Lobsters
📊Static Analysis
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·2d
🌐DNS Security
Flag this post
Engineering a Rust optimization quiz
fasterthanli.me·11h
🦀Rust Macros
Flag this post
This Week In Techdirt History: October 26th – November 1st
techdirt.com·3h
📰RSS Archaeology
Flag this post
word2vec-style vector arithmetic on docs embeddings
technicalwriting.dev·2d·
Proof Automation
Flag this post
Jackknife Transmittance and MIS Weight Estimation
momentsingraphics.de·1h·
Discuss: Hacker News
🌈Color Archaeology
Flag this post
Show HN: I trained an AI to write my YouTube titles
joshfonseca.com·21h·
Discuss: Hacker News
📊Feed Optimization
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.com·10h·
Discuss: Hacker News
🔒Hardware Attestation
Flag this post
Don't Let It Fade: Preserving Edits in Diffusion Language Models via Token Timestep Allocation
arxiv.org·1d
🎯Gradual Typing
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·7h
🕵️Vector Smuggling
Flag this post
Show HN: Font Finder – Find and Copy Fonts from Any Webpage
font-finder.org·1d·
Discuss: Hacker News
🔤Font Archaeology
Flag this post
Building a Self-Improving RAG System with Smart Query Routing and Answer Validation
dev.to·1d·
Discuss: DEV
🔍Information Retrieval
Flag this post
Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet
dev.to·11h·
Discuss: DEV
🛡️WASM Sandboxing
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·1d
🧪Property-Based Testing
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·3d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post