CHERIoT 1.0 released
lwn.net·11h
🧲RISC-V Preservation
Flag this post
Fluent Visitors: revisiting a classic design pattern
neilmadden.blog·3h
λLambda Formalization
Flag this post
Home lab Network Upgrade Time
jimmielightner.com·2d
📊Homelab Monitoring
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·12h
📝Concrete Syntax
Flag this post
Editorial: Experts' opinions in radiation & health: emerging issues in the field
pmc.ncbi.nlm.nih.gov·1d·
Discuss: Hacker News
🌡️Preservation Physics
Flag this post
Europe's Decentralized Messaging Survives "Chat Control" Threat
process-one.net·17h·
Discuss: Hacker News
🏺Protocol Archaeology
Flag this post
Lazy loading isn't the magic pill to fix AI Inference
tensorfuse-docs.mintlify.dev·10h·
Discuss: Hacker News
🌊Stream Processing
Flag this post
Musk's XChat is Safe as "Bitcoin-style" peer-to-peer encryption?
pbxscience.com·1d·
Discuss: Hacker News
🌊Stream Ciphers
Flag this post
We need to give LLMs human-like vision
matml.bearblog.dev·8h·
💻Local LLMs
Flag this post
Writing an LLM from scratch, part 27 – what's left, and what's next?
gilesthomas.com·1d·
Discuss: Hacker News
💻Local LLMs
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·6d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
Free Functions Don't Change Performance (Much)
16bpp.net·1d·
Discuss: Hacker News, r/cpp
🔩Systems Programming
Flag this post
Malwarebytes aces PCMag Readers’ Choice Awards and AVLab Cybersecurity Foundation tests
malwarebytes.com·1d
📡Feed Security
Flag this post
Decoding Kiroween
dev.to·11h·
Discuss: DEV
📜Binary Philology
Flag this post
Beyond Bandwidth: AI's Quantum Leap in Image Transmission
dev.to·13h·
Discuss: DEV
🧠Neural Compression
Flag this post
Digital Warfare and the New Geopolitical Frontline
heimdalsecurity.com·7h
🇸🇪Swedish Cryptanalysis
Flag this post
OpenAI API moonlights as malware HQ in Microsoft’s latest discovery
theregister.com·12h
🔓Hacking
Flag this post
Android Apps misusing NFC and HCE to steal payment data on the rise
securityaffairs.com·1d
🎫Kerberos Attacks
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·19h
🔐Homomorphic Encryption
Flag this post
Prepared for a cyber attack? The three questions that businesses must ask themselves
techradar.com·1d
🚨Incident Response
Flag this post