Beads – A memory upgrade for your coding agent
github.com·19h·
Discuss: Hacker News
⚙️Batch Processing
Human Texts Are Outliers: Detecting LLM-generated Texts via Out-of-distribution Detection
arxiv.org·1d
📜Binary Philology
Compilation is communication
mmapped.blog·1d
🛡️Proof-Carrying Archives
Auditing binaries like source code
zetier.com·14h
🔬Binary Analysis
Cheat Sheet: Perfect Acquisition (32-bit)
blog.elcomsoft.com·20h
💿DAT Forensics
Q&A: AI analysis for bioimages—what's missing?
phys.org·9h
👁️OCR Enhancement
Automated Retrospective Analysis & Predictive Maintenance of Polymer Degradation Using Multi-Modal Deep Learning
dev.to·6h·
Discuss: DEV
🔍Vector Forensics
Forensic Imaging Of A Third-Party’s Cellphone Denied In FMLA Suit
forensicfocus.com·15h
⚖️Digital Evidence
No more spaghetti – Operational CTI Value of VMRay UniqueSignal x OpenCTI
vmray.com·14h
🖥️Modern Terminals
The future of media sanitization at Google
cloud.google.com·12h·
Discuss: Hacker News
🔐Archive Encryption
The Anatomy of Modern Ranking Architectures: Part 2
shaped.ai·1d
🎯Retrieval Systems
Cambridge University launches project to rescue data trapped on old floppy disks
tomshardware.com·2d
📼Cassette Archaeology
Understanding Etsy’s Vast Inventory with LLMs
etsy.com·10h
🕵️Metadata Mining
Copy-and-Patch: A Copy-and-Patch Tutorial
transactional.blog·1d
🦀Rust Macros
Waverider: Scanning Spectra One Pixel at a Time
hackaday.com·11h
📊Spectrograms
How to Spin Up a Project Structure with Cookiecutter
towardsdatascience.com·13h
🕸️WebAssembly
Hash Me If You Can — How I Beat a 2-Second Hashing Challenge on RingZer0Team
infosecwriteups.com·20h
🌐DNS Security
American Solar Farms
tech.marksblogg.com·11h·
Discuss: Hacker News
🔶Voronoi Diagrams
Customer payment data stolen in Unity Technologies’s SpeedTree website compromise
securityaffairs.com·10h
🔓Hacking
Obsidian for the privacy-minded: offline, secure notes
techspot.com·8h
🗜️Zstandardized Archives