Sorting encrypted data without decryption: a practical trick
dev.to·13h·
Discuss: DEV
🔐Hash Functions
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Three ways formally verified code can go wrong in practice
buttondown.com·12h
📜Proof Carrying Code
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·7h·
Discuss: Hacker News
🦀Rust Macros
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·14h
🔓Hacking
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·19h
💎Information Crystallography
CodeSOD: A JSON Serializer
thedailywtf.com·1d
📦Deflate
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Basketball trivia, editing distances, and derangement
leancrew.com·2d
🌳Trie Structures
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·2d
📺VT100
APRS over LoRa with RNode | unsigned.io
unsigned.io·18h
📻Homebrew Protocols
My First Week of Vibecoding
underreacted.leaflet.pub·2h·
Discuss: Hacker News
🎯Gradual Typing
Let’s Make a Tic-Tac-Deal!
thefiddler.substack.com·17h·
Discuss: Substack
🎯Proof Tactics
Who Invented the Johnson Decade Counter (and Why)?
eejournal.com·2d·
Discuss: Hacker News
Homebrew CPUs
Cactus Language • Semantics 3
inquiryintoinquiry.com·13h
🔢Denotational Semantics
Neural Networks from Scratch in Python: Simpler Than You Think
hamza.se·8h·
Discuss: Hacker News
📊Quantization