Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท10h
๐Ÿ›กCybersecurity
UNREDACTED Magazine Issue 009
inteltechniques.comยท1h
๐Ÿ“กRSS Readers
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท9h
๐Ÿ”Vector Forensics
pgtricks โ€“ two tools for backing up PostgreSQL database dumps
github.comยท5hยท
Discuss: Hacker News
๐ŸŒณGit Internals
Static Bundle Object: Modernizing Static Linking
medium.comยท3dยท
๐Ÿ”—Static Linking
GaloisInc/parameterized-utils
github.comยท2d
๐ŸงฎAlgebraic Datatypes
A Manifesto for the Programming Desperado
github.comยท8hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Sorting encrypted data without decryption: a practical trick
dev.toยท8hยท
Discuss: DEV
๐Ÿ”Hash Functions
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
Let's Write a Macro in Rust
hackeryarn.comยท7hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
The Day I Hacked XCTrack
blog.syrac.orgยท9hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท19h
๐Ÿ”—Graph Isomorphism
go-async, a type-Safe, retryable, and deterministic concurrency for Go
reddit.comยท16hยท
Discuss: r/golang
๐Ÿฆ€Rust Borrowing
People rescuing forgotten knowledge trapped on old floppy disks
bbc.comยท11hยท
Discuss: Hacker News
๐Ÿ“ผCassette Archaeology
A Year of Gentoo
arch.dogยท10hยท
โ„Nix
From Documents to Dialogue: A step-by-step RAG Journey
dev.toยท9hยท
Discuss: DEV
๐Ÿ“ŠMulti-vector RAG
Three ways formally verified code can go wrong in practice
buttondown.comยท6h
๐Ÿ“œProof Carrying Code
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท23hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Publishing my bachelor's thesis in applied mathematics
timktitarev.wordpress.comยท6hยท
Discuss: Hacker News
๐Ÿ“Linear Algebra
Efficient and accurate search in petabase-scale sequence repositories
nature.comยท2dยท
Discuss: Hacker News
๐Ÿ”„Burrows-Wheeler