Promise based Web Worker Messaging
muffinman.ioΒ·1d
🌊Stream Processing
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Flag this post
Doo: A Simple, Fast Programming Language Built on Rust and LLVM
news.ycombinator.comΒ·22hΒ·
Discuss: Hacker News
πŸ¦€Rust Macros
Flag this post
β€˜TruffleNet’ Attack Wields Stolen Credentials Against AWS
darkreading.comΒ·20h
🎫Kerberos Attacks
Flag this post
What is SimHash?
dev.toΒ·11hΒ·
Discuss: DEV
πŸ”—Binary Similarity
Flag this post
AI Models Write Code with Security Flaws 18–50% of the Time, New Study Finds
medium.comΒ·13hΒ·
Discuss: Hacker News
πŸ“Code Metrics
Flag this post
Accumulating Context Changes the Beliefs of Language Models
arxiv.orgΒ·2h
πŸ€–Grammar Induction
Flag this post
Automatic Minds: Cognitive Parallels Between Hypnotic States and Large Language Model Processing
arxiv.orgΒ·2h
✨Effect Systems
Flag this post
Zero-RAG: Towards Retrieval-Augmented Generation with Zero Redundant Knowledge
arxiv.orgΒ·2h
πŸ”Information Retrieval
Flag this post
pg_stat_plans: Track per-plan call counts, execution times and EXPLAIN texts
github.comΒ·1dΒ·
Discuss: Hacker News
🧬PostgreSQL Forensics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”Quantum Security
Flag this post
Show HN: Self-Hostable ZK Markdown Sharing Service
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Flag this post
From Evidence to Verdict: An Agent-Based Forensic Framework for AI-Generated Image Detection
arxiv.orgΒ·2h
πŸ”Vector Forensics
Flag this post
LLM-Driven Cost-Effective Requirements Change Impact Analysis
arxiv.orgΒ·2h
πŸ”„Language Evolution
Flag this post
Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.comΒ·2dΒ·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
dev.toΒ·21hΒ·
Discuss: DEV
🌊Streaming Systems
Flag this post
On Designing Low-Latency Systems for High-Traffic Environments
hackernoon.comΒ·14h
🌊Stream Processing
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comΒ·1d
πŸ”—Hash Chains
Flag this post
Visual Backdoor Attacks on MLLM Embodied Decision Making via Contrastive Trigger Learning
arxiv.orgΒ·1d
πŸ”²Cellular Automata
Flag this post