Reed-Solomon, BCH Codes, Hamming Distance, Forward Error Correction
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.ukยท18h
Edge cases in DNSSEC validation with multiple algorithms
blog.apnic.netยท13h
The Dark Art of Financial Disguise in Web3: Money Laundering Schemes and Countermeasures
arxiv.orgยท11h
A Practical Guide to Regular Expressions โ Learn RegEx with Real Life Examples
freecodecamp.orgยท9h
Sparking joy
leancrew.comยท18h
CBOR ๅ MsgPack ๆฏไธๅไบ
blog.est.imยท2d
Notes, 2025-09-29
scopeofwork.netยท1h
Apply the Trie: Word Search
mmhaskell.comยท6h
Halo2's Elegant Transcript As Proof
cryptologie.netยท1d
Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italyโs Piracy Shield
labs.ripe.netยท5h
Sex offenders, terrorists, drug dealers, exposed in spyware breach
malwarebytes.comยท53m
Working at ABI boundaries
rkrishnan.orgยท1d
Loading...Loading more...