It takes a Kraken to scan billions of source files
softwareheritage.org·2d
🏠Homelab Archaeology
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
A new breed of analyzers
daniel.haxx.se·22h·
🐛Fuzzing
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Progress being made in porting AMD OpenSIL Turin PoC to Coreboot in a Gigabyte MZ33-AR1
blog.3mdeb.com·13h·
🖥️Terminal Renaissance
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.io·19h·
🔓Open Source Software
Oracle E-Business Suite exploitation traced back as early as July
cybersecuritydive.com·19h
🔓Hacking
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics
Building Self-Correcting Database Agents with Meta's Llama-4-Scout: From Natural Language to SQL Insights
dev.to·1d·
Discuss: DEV
🗄️Database Internals
Why Self-Host?
romanzipp.com·1d·
Discuss: Hacker News
🏠Personal Archives
Software Architecture Horror Story
blog.mihaisafta.com·2h·
Discuss: Hacker News
🔌Interface Evolution
The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
An enough week
blog.mitrichev.ch·1d·
📈Linear programming
FBI takes down BreachForums portal used for Salesforce extortion
bleepingcomputer.com·7h·
Discuss: Hacker News
🎫Kerberos Exploitation
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·12h·
Discuss: Hacker News
🦀Rust Macros
Programmer in Wonderland
binaryigor.com·1d·
Discuss: Hacker News
🔩Systems Programming
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.com·18h·
Discuss: Hacker News
💣ZIP Vulnerabilities