๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ—๏ธ Constructive Analysis

Intuitionistic Mathematics, Computable Reals, Bishop Mathematics, Proof Relevance

Using a Framework Desktop for local AI
frame.workยท3d
๐Ÿ’ปLocal LLMs
Grad School Life: Surviving and Thriving Beyond Coursework and Research
cup.columbia.eduยท21hยท
Discuss: Hacker News
๐Ÿ›Digital humanities
A default McDonald's password left millions exposed
smartcompany.com.auยท1hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Micro Common Lisp
t3x.orgยท4dยท
Discuss: Lobsters, Hacker News
๐Ÿง Lisp Dialects
Escalated, the AI Browser Wars Have โ€“ Quickly
spyglass.orgยท21hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Token Hygiene โ€“ AI context window curation
marlin-verlag.deยท19hยท
Discuss: Hacker News
๐Ÿ”„Session Type Inference
Java Criminally Underhyped? Not Back in 1997. (2021)
dylanbeattie.netยท1dยท
Discuss: Hacker News
๐ŸŽฎSwitch Archaeology
Thank you for calling Web Dev. How may we complicate things for you?
newslttrs.comยท23hยท
Discuss: Hacker News
๐ŸŒWeb Standards
AI malware can now evade Microsoft Defender โ€” open-source LLM outsmarts tool around 8% of the time after three months of training
tomshardware.comยท23hยท
Discuss: r/technews
๐Ÿ”“Hacking
ClickOps Is a Disgrace
thenewstack.ioยท23h
๐Ÿ“Code Metrics
PotentRegion4MalDetect: Advanced Features from Potential Malicious Regions for Malware Detection
arxiv.orgยท1d
๐Ÿฆ Malware Analysis
Math Game Monday: Pattern Block Mastermind
denisegaskins.comยท3d
๐Ÿ”ฒCellular Automata
Real-time simulation makes understanding nonlinear quantum dynamics much easier
phys.orgยท21h
โš›๏ธQuantum Tape
When Data-Free Knowledge Distillation Meets Non-Transferable Teacher: Escaping Out-of-Distribution Trap is All You Need
arxiv.orgยท3d
๐Ÿ’ปLocal LLMs
Who's the Mole? Modeling and Detecting Intention-Hiding Malicious Agents in LLM-Based Multi-Agent Systems
arxiv.orgยท3d
๐ŸŽฏThreat Hunting
Topic Modeling and Link-Prediction for Material Property Discovery
arxiv.orgยท2d
๐ŸงญContent Discovery
Helen Of Troy: Buying Peak Fear
seekingalpha.comยท14h
โšกHTMX
Show HN: Empromptu.ai โ€“ Agentic AI Building AI Apps
news.ycombinator.comยท3dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
๐Ÿš€ Grok 4 Has Arrived: A New Era in AI Reasoning, Coding, and Real-Time Insight
dev.toยท33mยท
Discuss: DEV
๐ŸŒ€Brotli Internals
eSIM security research (GSMA eUICC compromise and certificate theft)
seclists.orgยท2dยท
Discuss: Hacker News
๐ŸบKerberos Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap