Codeminer42 Dev Weekly #82
blog.codeminer42.com·15h
🎯Gradual Typing
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.com·3d·
💿ZFS Internals
A new breed of analyzers
daniel.haxx.se·20h·
🐛Fuzzing
Ship Broken Things
matmul.net·1d·
Discuss: Hacker News
🔗Topological Sorting
Show HN: Comparegpt.io – Trustworthy Mode to reduce LLM hallucinations
news.ycombinator.com·1d·
Discuss: Hacker News
🔍BitFunnel
A Year of Gentoo
arch.dog·18h·
Nix
Cache smuggling: When a picture isn't a thousand words
expel.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities
10 Data + AI Observations for Fall 2025
towardsdatascience.com·18h
🌊Stream Processing
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.com·7h·
Discuss: Hacker News
🧬PostgreSQL Forensics
From Clicks to Code: Building a Production‑Ready EVM Transaction Client (Approve, Mint, Swap, EIP‑1559)
dev.to·1d·
Discuss: DEV
Format Verification
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·2d·
Discuss: Hacker News
🛡️eBPF Security
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.com·22h
🔗Hash Chains
Three Solutions to Nondeterminism in AI
blog.hellas.ai·2d·
Discuss: Hacker News
🎯Performance Proofs
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.to·4h·
Discuss: DEV
🔗Supply Chain
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·11h
🎫Kerberos Attacks
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·1d
📞Session Types
Building Resilient AI Agents on Serverless | Restate
restate.dev·1d·
🧱Immutable Infrastructure
TCDRM: A Tenant Budget-Aware Data Replication Framework for Multi-Cloud Computing
arxiv.org·1d
💾Storage Replication
Hardening SSH with Touch-Verified Hardware Keys
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation