Efficient and accurate search in petabase-scale sequence repositories
nature.com·3h
🔄Burrows-Wheeler
In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight
fastly.com·1d
🏠Homelab Pentesting
Show HN: Sweep, AI autocomplete for JetBrains that rewrites code
sweep.dev·1d·
Discuss: Hacker News
🌳Incremental Parsing
Roll your own bot detection: fingerprinting/JavaScript
blog.castle.io·11h·
Discuss: Hacker News
🔗Binary Similarity
Cache smuggling: When a picture isn't a thousand words
expel.com·1h·
Discuss: Hacker News
💣ZIP Vulnerabilities
A Detailed Workflow for Creating an MCP Server that Returns MySQL Schema Information Using Vibe Coding
dev.to·2h·
Discuss: DEV
🗄️Database Internals
Is Odin Just a More Boring C?
dayvster.com·2d·
Discuss: Hacker News
🔩Systems Programming
The Email They Shouldn't Have Read
it-notes.dragas.net·6h·
Discuss: Hacker News
🔓Hacking
Princeton Engineering Anomalies Research
pearlab.icrl.org·20h·
Discuss: Hacker News
🌡️Preservation Physics
AI Tulips
mamund.substack.com·13h·
Discuss: Substack
🤖AI Curation
Database Transactions: Everything That Can Go Wrong When Using Them
hackernoon.com·1d
📝Database WAL
Why Your Password Storage is Fine, But Your File Checksum is Obsolete
dev.to·15h·
Discuss: DEV
Checksum Validation
Preventing Invalid Database Access at Compile Time
svix.com·1d·
🦀Rust Borrowing
Let's Prove Leftpad
github.com·1d·
Discuss: Hacker News
📜Proof Carrying Code
2025 Hackaday Supercon: More Wonderful Speakers
hackaday.com·1d
⚙️DIY Electronics
Rust vs C, C++, Java & Python — 5 Everyday Programs Compared
dev.to·4h·
Discuss: DEV
🦀Rust Macros
WASM in the Kernel: Tales of Triumph and Trouble
riptides.io·2d·
Discuss: Hacker News
🔒WASM Capabilities
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·2d·
Discuss: Hacker News
💻Local LLMs
When Claude’s 'Help' Turns Harmful: A Developer’s Cautionary Tale
dev.to·1h·
Discuss: DEV
⚔️Lean Tactics
Detecting Semantic Clones of Unseen Functionality
arxiv.org·1d
🔗Binary Similarity