Beyond good ol’ Run key, Part 151
hexacorn.com·4d
💾Persistence Strategies
Meet the Mentors, Introduced by the 2025 Cohort
ica.org·2d
⚖️Archive Ethics
CISA wants to maintain control of CVE program
cisa.gov·13h·
Discuss: Hacker News
🛡Cybersecurity
Prototype Pollution in Python (2023)
blog.abdulrah33m.com·1d·
Discuss: Hacker News
🔓Reverse engineering
Show HN: TurboStitchGif new version 1.1 (alternative to giflib)
news.ycombinator.com·21h·
Discuss: Hacker News
🗜️LZW Variants
MIT software tool turns everyday objects into animated, eye-catching displays
news.mit.edu·2d·
Discuss: Hacker News
📐Mathematical Art
2025 Lasker Award Winners
laskerfoundation.org·9h·
Discuss: Hacker News
📐Mathematical Art
Magnetic Bubble Memory
smbaker.com·6d·
Discuss: Hacker News
🎞️Tape Combinatorics
‘Super Mario Bros. 2’ Officially Titled ‘Super Mario Galaxy Movie’
variety.com·19h
📺Retrogaming
A Robot Wrote My Research
particle.scitech.org.au·1d·
Discuss: Hacker News
🤖AI Curation
I can't change people's opinions about me - Fernandes in his own words
bbc.com·3h
📡Information theory
Cyber gang "Scattered Lapsus$ Hunters" announces farewell - a little bit
heise.de·1h
🔓Hacking
A Look at Not an Android Emulator
hackaday.com·3d
🎮Vintage Gaming
StringTape: Apache Arrow-compatible space-efficient "tape" class in pure Rust
github.com·1d·
Discuss: Hacker News
🦀Rust Verification
Old Phone Upcycled Into Pico Projector, ASMR
hackaday.com·1d
🗂️Optical Jukebox
Open Source AI
dev.to·1d·
Discuss: DEV
🔐Systems Hardening
Peer Review
dev.to·6h·
Discuss: DEV
❄️Nix Flakes
Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets
theregister.com·1d·
Discuss: Hacker News
🛡️RISC-V Security
[Guest post] Digital replicas of the dead: a growing trend, a missing legal framework
ipkitten.blogspot.com·3d·
⚖️Emulation Ethics
Visual Programmability: A Guide for Code-as-Thought in Chart Understanding
arxiv.org·1d
Bidirectional Programming