Bypassing WiFi Client Isolation
pulsesecurity.co.nzยท1d
๐ŸŒNetwork Security
simonw/claude-skills
simonwillison.netยท3d
๐Ÿ“„PostScript
Organising my feeds using Permaculture principles - Kedara.eu
kedara.euยท9h
๐Ÿ“ฐRSS Reading Practices
Credential Stuffing
ciamweekly.substack.comยท1dยท
Discuss: Substack
๐ŸŽฏNTLM Attacks
I trained a ChatGPT clone for ยฃ75
samdobson.ukยท7hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
The Great Software Quality Collapse
developers.slashdot.orgยท5h
๐Ÿ”ฉSystems Programming
Hiring in the Age of AI
morningcoffee.ioยท2dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Show HN: Blocking Sensitive Data Leaks to GenAI Tools โ€“ A Browser Extension
news.ycombinator.comยท6hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
Evaluating Actual Performance Against Targets Using Tableau
dev.toยท9hยท
Discuss: DEV
๐Ÿง Query Planners
Log Real-Time BLE Air Quality Data to Google Sheet
hackster.ioยท1d
๐Ÿ”ŒInterface Evolution
Contributors to Scientific Americanโ€™s November 2025 Issue
scientificamerican.comยท9h
๐Ÿ“กRSS
Clop Ransomware group claims the hack of Harvard University
securityaffairs.comยท2d
๐Ÿ”“Hacking
Chinese hackers abuse geo-mapping tool for year-long persistence
bleepingcomputer.comยท7hยท
๐Ÿ”“Hacking
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Vector Forensics
AI Driven Daily Sales Report Generator
dev.toยท7hยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Humans still win: why frontend basics matter โ€” even with Gemini, GPT, and Claude
dev.toยท21hยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Enhanced Sampling for Efficient Learning of Coarse-Grained Machine Learning Potentials
arxiv.orgยท15h
๐Ÿ“ŠQuantization
Verifying Chain-of-Thought Reasoning via Its Computational Graph
arxiv.orgยท1d
๐Ÿ”—Constraint Handling
LLM-Specific Utility: A New Perspective for Retrieval-Augmented Generation
arxiv.orgยท15h
๐Ÿ”Information Retrieval