Binary Protocol Testing, Security Validation, Parser Robustness, Format Security

[$] Creating a healthy kernel subsystem community
lwn.net·1d
🔩Systems Programming
Programming the TMS9918A Video Display Processor
bumbershootsoft.wordpress.com·17h
🎮Gameboy Emulation
Attorney Generals go after Bitcoin ATMs for supporting Fraud
garwarner.blogspot.com·17h·
🎫Kerberos Attacks
Internet Phone Book
naiveweekly.com·9h
📰RSS Reading Practices
California's age verification bill for app stores and operating systems takes another step forward
engadget.com·15h
🛡️ARM TrustZone
Build, run and debug iOS and Mac apps in Zed instead of Xcode
luxmentis.org·1d·
Discuss: Hacker News
🍎XNU Internals
SaaS Ethics Manifesto
mdubakov.me·1d·
Discuss: Hacker News
🏠Personal Archives
Maybe Everything is OSS Now (but Not F)
jeffwofford.com·2d·
Discuss: Hacker News
🔓Open Source Software
HiTex: A spam factory for AI-generated books
laurent.le-brun.eu·3d·
Discuss: Hacker News
🚀Indie Hacking
Show HN: Llmswap – Universal AI SDK and Code Generation CLI
sreenathmenon.com·3d·
Discuss: Hacker News
🪟Awesome windows command-line
Forest fire detection system
hackster.io·4d
⚙️DIY Electronics
Live(r) Die: Predicting Survival in Colorectal Liver Metastasis
arxiv.org·2d
🧠Machine Learning
ZynorRAT: The New Cross-Platform Malware Controlled via Telegram
securityonline.info·1d·
Discuss: Hacker News
🚀Indie Hacking
Notes from PyData Berlin 2025
dev.to·4d·
Discuss: DEV
🌀Brotli Internals
GmSLM : Generative Marmoset Spoken Language Modeling
arxiv.org·2d
🎙️Whisper
Chaining Path Traversal Vulnerability to RCE — Meta’s 111,750$ Bug
infosecwriteups.com·6d
🔓Hacking
Top AI Tools for Software Development Teams in 2025
dev.to·2d·
Discuss: DEV
Proof Automation
ACE-RL: Adaptive Constraint-Enhanced Reward for Long-form Generation Reinforcement Learning
arxiv.org·6d
🔲Cellular Automata