Issue 730
iosdevweekly.com·1d
🔌Interface Evolution
Love C, Hate C: Web Framework Memory Problems
alew.is·1d·
Discuss: Hacker News
🔩Systems Programming
I Built the Perfect Workflow and attracted some friends in the process
graemefawcett.ca·6h·
Discuss: Hacker News
Proof Automation
SSH Security: Why You Should Touch to Verify
ubicloud.com·21h·
Discuss: Hacker News
🔒Hardware Attestation
The Day I Hacked XCTrack
blog.syrac.org·14h·
Discuss: Hacker News
🔐PKI Archaeology
AAS: The Metric for Monitoring DB Performance
kylehailey.com·2h·
Discuss: Hacker News
🗄️Database Internals
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
Finding a VS Code Memory Leak
randomascii.wordpress.com·1d·
🧠Memory Forensics
Show HN: 1M retail interior image dataset for computer vision (UK/US/EU)
groceryinsight.com·17h·
Discuss: Hacker News
🏺Compression Museums
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·3d
📦Container Security
Show HN: Nanowakeword – Automates custom wake word model training
github.com·17h·
Discuss: Hacker News
🎙️Whisper
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·1d·
Discuss: r/LLM
💻Local LLMs
Multi-Core By Default
rfleury.com·1d·
🔩Systems Programming
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4d
🔐Cryptographic Archaeology
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.org·1d
💻Local LLMs
JVM stack is about to be massively modernized
medium.com·11h·
Discuss: Hacker News
🔗Dependency Resolution
A major evolution of Apple Security Bounty
security.apple.com·19h·
🛡️RISC-V Security
Microsoft hypes PCs with NPUs, still can't offer a good reason to buy one
theregister.com·21h·
Discuss: Hacker News
🔌Operating system internals
Jankiest rpi router
mloduchowski.com·1d·
Discuss: r/homelab
🔌Single Board PC
We found a bug in Go's ARM64 compiler
blog.cloudflare.com·2d·
📜Proof Carrying Code