This dangerous new Android malware disguises itself as a VPN or IPTV app - so be on your guard
techradar.comยท15h
๐Ÿ”“Hacking
Vibe coding...meet safe packages.
boostsecurity.ioยท15h
๐Ÿ“œProof Carrying Code
How to rebuild a project from scratch
markjgsmith.comยท19h
โš™๏ธBuild Archaeology
Slices: A complete development platform for AT Protocol applications
slices.networkยท1dยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
A Pipeline Approach to Language Migrations
infoq.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
Haskell WebAssembly for Browser Interaction
funwithfunctions.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
EEFSUVA: A New Mathematical Olympiad Benchmark
arxiv.orgยท2h
๐ŸŽฏPerformance Proofs
Noisy-Pair Robust Representation Alignment for Positive-Unlabeled Learning
arxiv.orgยท2h
๐Ÿ“ŠLearned Metrics
AI Lessons Learned
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Fix(dd): ensure full block writes to handle partial writes to slow pipes
github.comยท1dยท
Discuss: Hacker News
๐Ÿ“บVT100
BeyondBench: Benchmark-Free Evaluation of Reasoning in Language Models
arxiv.orgยท3d
๐Ÿง Intelligence Compression
Purrception: Variational Flow Matching for Vector-Quantized Image Generation
arxiv.orgยท2h
๐ŸŒ€Fractal Compression
Enhanced Defect Characterization via Hybrid Bayesian Networks and Automated Microscopy
dev.toยท5hยท
Discuss: DEV
๐Ÿ”งHardware Verification
10000 dollar RE suite vs. Intel 1997. Guess who wins? (Full research inside)
github.comยท1dยท
Discuss: Hacker News
๐ŸŽฎSwitch Archaeology
Are LLMs Better GNN Helpers? Rethinking Robust Graph Learning under Deficiencies with Iterative Refinement
arxiv.orgยท2h
๐Ÿ’ปLocal LLMs
CodeSOD: Contracting Space
thedailywtf.comยท4d
โœ…Format Verification
InvThink: Towards AI Safety via Inverse Reasoning
arxiv.orgยท2h
โš–๏ธHoare Logic
Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm
aws.amazon.comยท14h
๐Ÿ”—Supply Chain
Are Foundation Models Ready for Your Production Tabular Data?
towardsdatascience.comยท1d
๐Ÿง Machine Learning