The Atom returns
blogger.com·10h
🧲RISC-V Archaeology
Encrypted Root and ZFS on NixOS
ryanseipp.com·2d
🔒Secure Boot
New release!
pdp2011.sytse.net·2d
🕸️WASM Archives
Linkdump No 72
82mhz.net·3d
🏺Gaming Archaeology
Migrating to TanStack Start
catalins.tech·1d·
Discuss: Hacker News
🦋Format Metamorphosis
Ultimate Guide to Dev Containers (2023)
daytona.io·10h·
Discuss: Hacker News
📦Container Security
The Rise of AI Cults
wisewolfmedia.substack.com·2d·
Discuss: Substack
Church Encoding
MIT-MC CP/M archive files, 1979-1984
github.com·3d·
Discuss: Hacker News
📼DAT Preservation
Anthropic’s new Claude feature can leak data—users told to “monitor chats closely”
arstechnica.com·5d·
Discuss: Hacker News
🔓Hacking
Making the Law Accessible to All : Middlemen Asia
dev.to·2d·
Discuss: DEV
🇨🇳Chinese Computing
Integrating Public Perspectives in Microreactor Facility Design
arxiv.org·3d
⚙️DIY Electronics
Using Amazon Textract to analyze and extract text from Documents Part 1
dev.to·16h·
Discuss: DEV
🎓Academic Torrents
Need suggestions for learning Go
reddit.com·4h·
Discuss: r/golang
🦀Rust Macros
HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya
securityaffairs.com·1d
🔒Secure Boot
OpenSSF Experts Weigh in on CISA’s SBOM Minimum Elements Update
thenewstack.io·2d
❄️Nix Adoption
GLAM: Geometry-Guided Local Alignment for Multi-View VLP in Mammography
arxiv.org·5h
🌀Differential Geometry
Navigating AI's Ethical Frontier: Mustafa Suleyman's Warnings on Superintelligence and Mimicked Consciousness
dev.to·3d·
Discuss: DEV
⚖️Emulation Ethics
DIV: A Textbook Case Of Yield Trap
seekingalpha.com·3h
🔍BitFunnel
Towards Knowledge-Aware Document Systems: Modeling Semantic Coverage Relations via Answerability Detection
arxiv.org·4d
📄Semantic Chunking
Hackers abuse TOR network and misconfigured Docker APIs to steal crypto - so keep an eye on your wallet
techradar.com·4d
🎫Kerberos Exploitation