SZI: Tiled Images from ZIP Archives
literarymachin.es·1d
🕸️WebP Analysis
Flag this post
Swift Sings: MDX-Net Vocal Splits and RVC Voice Conversion On-Device with ONNX/CoreML
web.navan.dev·1d
🎧Learned Audio
Flag this post
Checklist: Securely Using a Python Program
nocomplexity.com·22h
🛡️CLI Security
Flag this post
The art and science of effective security storytelling
redcanary.com·23h
🔗Data Provenance
Flag this post
Simple BBS in a Commodore Emulator
adamwhitney.net·12h
💾vintage computing
Flag this post
Splitting (Empty) Strings (2017)
chriszetter.com·27m·
Discuss: Hacker News
🧠Lisp Dialects
Flag this post
Distroless Containers for Corporate Use: Nix Flakes vs. Fedora
blog.riemann.cc·1d·
❄️Nix Adoption
Flag this post
DeepSeek-OCR: When a Picture Is Actually Worth 10 Fewer Tokens
dev.to·1d·
Discuss: DEV
📄Document Streaming
Flag this post
Signature schemes you've never heard about – Kobi Gurkan
kobi.leaflet.pub·3h·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.org·8h
🔍Vector Forensics
Flag this post
Is Your Data Valid? Why Bufstream Guarantees What Kafka Can't
vutr.substack.com·9h·
Discuss: Substack
🌊Streaming Systems
Flag this post
Secure by Design in the Age of GenAI: How Devs Must Shift Their Software Security Practices in 2025
dev.to·9h·
Discuss: DEV
🔄Reproducible Builds
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·1d
🕳️Information Leakage
Flag this post
A new measure for dynamic leakage based on quantitative information flow
arxiv.org·1d
🕳️Information Leakage
Flag this post
The Impossible Optimization, and the Metaprogramming to Achieve It
verdagon.dev·21h·
🧪Binary Fuzzing
Flag this post
Ralf Brown's Files (The x86 Interrupt List)
cs.cmu.edu·2d·
Discuss: Hacker News
📺VT100
Flag this post
We shrunk an 800GB container image down to 2GB (a 99.7% reduction). Here's our post-mortem.
reddit.com·1d·
Discuss: r/kubernetes
🏺ZIP Archaeology
Flag this post
An Analysis of iBoot's Image4 Parser
amarioguy.github.io·2d·
🔒Secure Boot
Flag this post
Exploring Vulnerability in AI Industry
arxiv.org·8h
🧠Intelligence Compression
Flag this post
How to Use Zorn's Lemma
gowers.wordpress.com·1d·
Discuss: Hacker News
⚔️Lean Theorem
Flag this post