Promise based Web Worker Messaging
muffinman.ioΒ·1d
🌊Stream Processing
Flag this post
Recent Vulnerabilities in Redis Server’s Lua Scripting Engine
offsec.comΒ·19h
🎫Kerberos Exploitation
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Flag this post
Doo: A Simple, Fast Programming Language Built on Rust and LLVM
news.ycombinator.comΒ·1dΒ·
Discuss: Hacker News
πŸ¦€Rust Macros
Flag this post
β€˜TruffleNet’ Attack Wields Stolen Credentials Against AWS
darkreading.comΒ·1d
🎫Kerberos Attacks
Flag this post
AI Models Write Code with Security Flaws 18–50% of the Time, New Study Finds
medium.comΒ·18hΒ·
Discuss: Hacker News
πŸ“Code Metrics
Flag this post
Understanding LangChain and LangGraph: A Beginner’s Guide to AI Workflows
dev.toΒ·21hΒ·
Discuss: DEV
πŸŽ™οΈWhisper
Flag this post
Accumulating Context Changes the Beliefs of Language Models
arxiv.orgΒ·7h
πŸ€–Grammar Induction
Flag this post
Zero-RAG: Towards Retrieval-Augmented Generation with Zero Redundant Knowledge
arxiv.orgΒ·7h
πŸ”Information Retrieval
Flag this post
Automatic Minds: Cognitive Parallels Between Hypnotic States and Large Language Model Processing
arxiv.orgΒ·7h
✨Effect Systems
Flag this post
pg_stat_plans: Track per-plan call counts, execution times and EXPLAIN texts
github.comΒ·1dΒ·
Discuss: Hacker News
🧬PostgreSQL Forensics
Flag this post
From Evidence to Verdict: An Agent-Based Forensic Framework for AI-Generated Image Detection
arxiv.orgΒ·7h
πŸ”Vector Forensics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”Quantum Security
Flag this post
LLM-Driven Cost-Effective Requirements Change Impact Analysis
arxiv.orgΒ·7h
πŸ”„Language Evolution
Flag this post
Show HN: Self-Hostable ZK Markdown Sharing Service
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Flag this post
Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.comΒ·2dΒ·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
dev.toΒ·1dΒ·
Discuss: DEV
🌊Streaming Systems
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comΒ·1d
πŸ”—Hash Chains
Flag this post
Visual Backdoor Attacks on MLLM Embodied Decision Making via Contrastive Trigger Learning
arxiv.orgΒ·1d
πŸ”²Cellular Automata
Flag this post