Devlog: Godot Game - A Trigger That Reveals Secrets
lmika.orgยท1h
๐ŸŽฏProof Tactics
Sharp Bilinear Filters: Big Clean Pixels for Pixel Art
bumbershootsoft.wordpress.comยท6h
๐ŸŒˆColor Archaeology
Letโ€™s Make a Tic-Tac-Deal!
thefiddler.substack.comยท1dยท
Discuss: Substack
๐ŸŽฏProof Tactics
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.comยท2dยท
๐ŸงฎAlgebraic Datatypes
7-Zip: Information on closed security gaps available
heise.deยท1d
๐Ÿ’ฃZIP Vulnerabilities
North Koreaโ€™s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.devยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Exposing Citation Vulnerabilities in Generative Engines
arxiv.orgยท2d
๐Ÿ“œDigital Philology
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.toยท22hยท
Discuss: DEV
๐Ÿ”—Supply Chain
Ship Broken Things
matmul.netยท2dยท
Discuss: Hacker News
๐Ÿ”—Topological Sorting
CVE-2025-11371: Unpatched zero-day in Gladinet CentreStack, Triofox under attack
securityaffairs.comยท5h
๐Ÿ”“Hacking
The Porcelain to Come
stackdiver.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Building an AI Internal Linking Plugin for WordPress
dev.toยท15hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
No Bullshit Guide to Statistics prerelease
minireference.comยท1dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
Automated Surface Tension Profiling via Static Contact Angle Analysis & Bayesian Inference
dev.toยท7hยท
Discuss: DEV
๐ŸŒ€Differential Geometry
The Day the CEO of Meta Stopped to Like My Vision
hackernoon.comยท8h
๐Ÿš€Indie Hacking
Bidirectional type checking step by step (in Ruby)
luizpvas.github.ioยท1dยท
Discuss: Hacker News
โฌŒBidirectional Typing
Understanding Latent Space: How Meaning Is Represented by AI
dev.toยท7hยท
Discuss: DEV
๐ŸงฎKolmogorov Complexity
Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks
darkreading.comยท1d
๐Ÿ”“Hacking