Exploring Data Extraction from iOS Devices: What Data You Can Access and How
blog.digital-forensics.itยท4dยท
๐ŸŽApple Archive
What melodies can be found in typography?
mikevandersanden.comยท1dยท
Discuss: Hacker News
๐Ÿ–‹Typography
Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress
linux.slashdot.orgยท2d
๐Ÿ“ŸTerminal Forensics
Microcomputers โ€“ The Second Wave: Toward A Mass Market
technicshistory.comยท1dยท
Discuss: Hacker News
๐ŸŽApple Computing
Microformats โ€“ building blocks for data-rich web pages
microformats.orgยท5hยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
Incremental Design, DevOps, Microservices & CICD โ€ข Michael Nygard & Dave Farley
youtube.comยท1d
๐Ÿ”„Reproducible Builds
The jank community has stepped up
jank-lang.orgยท1dยท
๐Ÿ”—Static Linking
Trusted enclaves from Intel and AMD shown vulnerable to physical attacks
techspot.comยท1dยท
Discuss: r/technews
๐Ÿ›ก๏ธRISC-V Security
I Ranked the Audio Quality of Eight Pairs of Smart Glasses, and It Was Surprisingly Difficult
lifehacker.comยท1d
๐Ÿ‘๏ธPerceptual Coding
The Vibe Coding Apocalypse
systemsandsociety.comยท1dยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Turning Gemini CLI into a Multi-Agent System with Just Prompts
aipositive.substack.comยท16hยท
Discuss: Substack
๐ŸšShell Automation
Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage
darkreading.comยท1d
๐Ÿ•ต๏ธVector Smuggling
How Simple IDs Can Leak Your Secrets
dev.toยท23hยท
Discuss: DEV
๐Ÿ”คEBCDIC Privacy
Prompt Caching Slashed My AI Bills by 90%. Here's What Nobody Tells You.
dev.toยท10hยท
Discuss: DEV
๐ŸŽ๏ธVarnish Cache
Predictive Preference Learning from Human Interventions
arxiv.orgยท1d
๐ŸŽ›๏ธFeed Filtering
Diagnosing Shortcut-Induced Rigidity in Continual Learning: The Einstellung Rigidity Index (ERI)
arxiv.orgยท2d
โœจEffect Handlers
The Tech Jester Who Pranks San Francisco
nytimes.comยท10hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Unpacking Musical Symbolism in Online Communities: Content-Based and Network-Centric Approaches
arxiv.orgยท2d
๐Ÿ’ฟBinary Musicology
Moxie Marlinspike: The Cypherpunk Pirate Who Built Signal
hackernoon.comยท3d
๐Ÿ•ต๏ธVector Smuggling