🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💾 Binary codes
The Shame of “Alligator Alcatraz”
newyorker.com·1h
⭐Awesome lists
Some Researchers Are Hiding Secret Messages in Their Papers, but They're Not Meant for Humans
smithsonianmag.com·9h
💧Manuscript Watermarks
About our proof-of-concept LLM tool for navigating Debian's manpages
gwolf.org·12h
🦀Rust Macros
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.com·2d
🦀Rust Verification
Good binding data is all you need
leashbio.substack.com·1d·
Discuss: Substack
🗂️Vector Databases
Hackers Are Finding New Ways to Hide Malware in DNS Records
wired.com·12h
🌐DNS Security
Show HN: 1.5B LLM routing model that aligns to preferences, not leaderboards
huggingface.co·3h·
Discuss: Hacker News
📝ABNF Parsing
The great misunderstanding of the DRY principle
pmatteo.com·3d·
Discuss: Hacker News
💧Liquid Types
Dot product on misaligned data
lemire.me·3d·
Discuss: Hacker News, r/cpp
🔩Systems Programming
LLMs Are Bad at Being Forced
morphllm.com·12h·
Discuss: Hacker News
💻Local LLMs
Show HN: I built an SDK for building an AI RAG app with Supabase and pgvector
github.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Neural Network-Guided Symbolic Regression for Interpretable Descriptor Discovery in Perovskite Catalysts
arxiv.org·20h
🕸️Algebraic Topology
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.to·12h·
Discuss: DEV
🌐Distributed Hash
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.org·20h
🕵️Vector Smuggling
Discrete Differential Principle for Continuous Smooth Function Representation
arxiv.org·2d
🌀Differential Geometry
[R][D] Interpretability as a Side Effect? Are Activation Functions Biasing Your Models?
reddit.com·1d·
Discuss: r/MachineLearning
📊Learned Metrics
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog
theregister.com·12h·
Discuss: Hacker News
🔐Quantum Security
Deep Neural Encoder-Decoder Model to Relate fMRI Brain Activity with Naturalistic Stimuli
arxiv.org·20h
🧠Neural Codecs
Show HN: SilentArena – Learn ransomware behavior safely (C-based)
github.com·12h·
Discuss: Hacker News
🦠Malware Analysis
C-FBI: A Combinatorial method using Convolutions for Circle Fitting in Blurry Images
arxiv.org·1d
🌀Fractal Compression
Loading...Loading more...
AboutBlogChangelogRoadmap