๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ผ Cassette Hacking

Tape Modification, Audio Exploitation, Sequential Attacks, Magnetic Security

Riskified Ltd. (RSKD) Q2 2025 Earnings Call Transcript
seekingalpha.comยท11h
๐ŸŽซKerberos Attacks
[RIDGELINE] Eating Linoliem in Karuizawa
craigmod.comยท2d
๐Ÿ—ƒarchives
Reading List 08/16/25
construction-physics.comยท2d
๐Ÿ–ฅ๏ธModern Terminals
3D Layered Text: The Basics
css-tricks.comยท13h
๐Ÿ–‹Typography
Powerful tools inside a single Chrome extension
superdevpro.comยท21hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Adobeโ€™s Stock Is in a Free-Fall: And AI Plus Sky-High Subscription Fees May Be to Blame
madcornishprojectionist.co.ukยท17h
๐Ÿ”BitFunnel
Type 2 Growth
kk.orgยท11hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
I Asked AI to Invent the Perfect Political System. Here's What It Created
wisewolfmedia.substack.comยท23hยท
Discuss: Substack
๐ŸŒCultural Algorithms
Bandicoot: A Templated C++ Library for GPU Linear Algebra
arxiv.orgยท23h
โšกParallel Computing
Approaching the Source of Symbol Grounding with Confluent Reductions of Abstract Meaning Representation Directed Graphs
arxiv.orgยท23h
๐Ÿ“Binary Grammars
Mitigating Modality Quantity and Quality Imbalance in Multimodal Online Federated Learning
arxiv.orgยท23h
๐ŸŽ›๏ธFeed Filtering
Temporally-Similar Structure-Aware Spatiotemporal Fusion of Satellite Images
arxiv.orgยท23h
๐Ÿ‘๏ธPerceptual Hashing
Securityโ€™s blind spot: the problem with taking CVE scores at face value
techradar.comยท19h
๐Ÿ”“Hacking
Automated Microvascular Flow Simulation Validation via Multi-modal Anomaly Detection
dev.toยท12hยท
Discuss: DEV
๐ŸŒŠStream Processing
Context Misleads LLMs: The Role of Context Filtering in Maintaining Safe Alignment of LLMs
arxiv.orgยท3d
๐Ÿ’ปLocal LLMs
Automating the Derivation of Unification Algorithms: A Case Study in Deductive Program Synthesis
arxiv.orgยท23h
๐Ÿ”ฎProof Search
Real-Time Micro-Movement Anomaly Detection for Stroke Rehabilitation via Spatio-Temporal Graph Convolutional Neural Networks
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Riemannian Computing
Real-Time eBPF Intrusion Detection via Dynamic Kernel Graph Pruning & Anomaly Scoring
dev.toยท4dยท
Discuss: DEV
๐Ÿ”eBPF
Dynamic Fractional Order Optimization via Adaptive Lagrangian Relaxation
dev.toยท1dยท
Discuss: DEV
โšกIncremental Computation
The Boimler Principles for AI Development: A Manifesto for Learning Systems with Character
dev.toยท11hยท
Discuss: DEV
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap