Your passwords don’t need so many fiddly characters, NIST says
malwarebytes.comยท2d
๐Ÿ”“Password Cracking
Longevity Mystery Solved
erictopol.substack.comยท35mยท
Discuss: Substack
๐ŸงฌCopy Number Variants
Mid-October 2025 Science and Technology Roundup: AI, VR, Crypto, Quantum, and Beyond
future.forem.comยท1dยท
Discuss: DEV
๐Ÿ”Quantum Security
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.comยท3dยท
๐ŸงฎAlgebraic Datatypes
Is GRPO Broken?
neelsomaniblog.comยท2dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
N8n vs. Windmill vs. Temporal
blog.arcbjorn.comยท3dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.ioยท2dยท
๐Ÿ”“Open Source Software
The Seven Trillion Dollar Scam
alilybit.comยท8hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
A Proof of the Riemann Hypothesis
dev.toยท4dยท
Discuss: DEV
โš”๏ธLean Theorem
The Access Control Apocalypse: How Broken Permissions Gave Me Keys to Every Digital Door
infosecwriteups.comยท4h
๐Ÿ”“Hacking
Aks HN: Large scale refactorings with LLM. Any experience to share?
news.ycombinator.comยท16hยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Automated Grain Size Control via Dynamic Annealing and Feedback-Driven Compositional Tuning in Perovskites
dev.toยท15hยท
Discuss: DEV
๐Ÿ’ŽInformation Crystallography
Automated Microfluidic Enrichment & Quantification of Exosomal ctDNA via Hybrid-Optic Nanoparticle Resonance Mapping
dev.toยท2dยท
Discuss: DEV
๐Ÿ“„Document Digitization
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.comยท2dยท
๐Ÿ› ๏ธGreaseweazle
Databite: A set of open-source integration libraries
github.comยท13hยท
๐Ÿ”—Topological Sorting
Automated Fault Isolation & Healing in Linear Control Systems via Multi-Modal Data Fusion & Reinforcement Learning
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธError Boundaries
(FULLY OPEN SOURCE) open-computer-use: Computer agents working on their own VMs
github.comยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Orchestration
Real-time Anomaly Detection in Financial Transactions via Hybrid Reinforcement Learning and Graph Neural Networks
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Cybercrime ring GXC Team dismantled in Spain, 25-year-old leader detained
securityaffairs.comยท1d
๐Ÿ”“Hacking
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.toยท2dยท
Discuss: DEV
โš™๏ธProof Engineering