The new container based project structure
markjgsmith.comยท1d
๐Ÿ“ฆMETS Containers
Social Media Provenance Challenge
tbray.orgยท2d
๐Ÿ”PKI Archaeology
Mathematical Discoveries of 2024
scientificamerican.comยท19hยท
Discuss: Hacker News
๐Ÿ“Mathematical Art
Enshittification: Why Everything Suddenly Got Worse and What to Do About It
versobooks.comยท2dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Social media surveillance is ubiquitous, according to research literature review
phys.orgยท1d
๐ŸงญContent Discovery
Higher-Level Design Patterns
qouteall.funยท22hยท
Discuss: Hacker News
โœจAlgebraic Effects
Despite opposition, UK government intends to move forward with Digital ID scheme
petition.parliament.ukยท1dยท
Discuss: Hacker News
โš–๏ธLegal Compliance
WireTap: Breaking Server SGX via DRAM Bus Interposition
wiretap.failยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธRISC-V Security
Safeguarding Content Quality Against AI "Slop"
blog.iil.comยท1dยท
Discuss: Hacker News
๐Ÿค–AI Curation
Open-source fingerprinting vs. Fingerprint Pro: Accuracy comparison
fingerprint.comยท1d
๐Ÿ”—Binary Similarity
Smart Valves: When Engineering Standards Speak Machine
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Digital Ethics Position Paper: Deepfakes
dev.toยท1dยท
Discuss: DEV
โš–๏ธEmulation Ethics
Seeing Before Reasoning: A Unified Framework for Generalizable and Explainable Fake Image Detection
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Show HN: tstr - PEP 750 Template String Utilities & Backports
github.comยท21hยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
Adaptive Environmental Monitoring and Smart Access Control
hackster.ioยท1d
๐Ÿ Home Automation
Master Crypto Security: Your Complete Guide to Safe Wallet Management
hackernoon.comยท3d
๐Ÿ”—Hash Chains
NPN: Non-Linear Projections of the Null-Space for Imaging Inverse Problems
arxiv.orgยท1d
๐ŸŒ€Riemannian Computing
sentdex: Is My Unitree G1 Spying on Me?
dev.toยท2dยท
Discuss: DEV
๐Ÿ•ต๏ธVector Smuggling