Best infosec-related long reads for the week of 10/4/25
metacurity.comยท58m
๐Ÿ›กCybersecurity
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท22h
๐Ÿ”Vector Forensics
Announcing coreboot 25.09 release
blogs.coreboot.orgยท12h
๐Ÿ”ŒOperating system internals
"i like making thingsโ€”" no. you like things.
kivikakk.eeยท2d
๐Ÿ“Code Metrics
To MD - Convert PDFs, Word, HTML and more to Markdown
tomd.ioยท1dยท
Discuss: Hacker News
๐Ÿ”„Migration Tools
I built physical album cards with NFC tags to teach my son music discovery
fulghum.ioยท16hยท
Discuss: Hacker News
๐Ÿ“ผAudio Cassettes
Efficient and accurate search in petabase-scale sequence repositories
nature.comยท2dยท
Discuss: Hacker News
๐Ÿ”„Burrows-Wheeler
We can just do things together
leaflet.pubยท15hยท
Discuss: Hacker News
๐Ÿ“กBGP Archaeology
Why Self-Host?
romanzipp.comยท1dยท
Discuss: Hacker News
๐Ÿ Personal Archives
Retentive Relevance: Capturing Long-Term User Value in Recommendation Systems
arxiv.orgยท1d
๐ŸŽฏContent Recommendation
Humanity's Portrayal in Adrian Tchaikovsky's Children of Time
self-rover.bearblog.devยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Customizing text content moderation with Amazon Nova
aws.amazon.comยท1d
๐Ÿ“ŠFeed Optimization
Proposal: Deconfig โ€“ Distributed Git Infrastructure with Durable Objects
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆGit LFS
Building the Reasoning Engine at Axiom
axiommath.aiยท16hยท
Discuss: Hacker News
โš”๏ธLean Tactics
In-Depth Analysis: "Attention Is All You Need"
dev.toยท21hยท
Discuss: DEV
๐Ÿง Intelligence Compression
The Custom Conveyor: Building Your Own Iterators
dev.toยท8hยท
Discuss: DEV
๐Ÿ”„Burrows-Wheeler
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท1d
๐Ÿ”—Graph Isomorphism
Show HN: Lore Engine โ€“ Turn 10-hour lectures into 2 hours of comprehensive notes
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“„Document Streaming
Operable Software
ferd.caยท23hยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability