An enough week
blog.mitrichev.chยท2dยท
๐Ÿ“ˆLinear programming
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท3d
๐ŸŒWARC Forensics
Get ready for this
aardvark.co.nzยท2d
๐Ÿ“ฐRSS Archaeology
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท4d
๐Ÿ”ขReed-Solomon Math
Overcoming Obstacles to Passwordless Authentication
cacm.acm.orgยท3d
๐Ÿ”“Hacking
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.comยท1dยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
1990s Millport CNC Vertical Mill Revival
salvagedcircuitry.comยท4hยท
Discuss: Hacker News
โš™๏ธModern Assembly
Intimate conversations with AI chatbots were visible to everyone
heise.deยท16h
๐Ÿ”“Hacking
Metascience Since 2012: A Personal History
goodscience.substack.comยท6hยท
Discuss: Substack
๐ŸŽ“Academic Torrents
Faking a Rational Design Process in the AI Era: Why Documentation Matters
albertsikkema.comยท1dยท
Discuss: Hacker News
โš™๏ธProof Engineering
Hyper-Personalized Cyberbullying Mitigation via Adaptive Linguistic Fingerprinting and Behavioral Anomaly Detection
dev.toยท19hยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
10 Data + AI Observations for Fall 2025
towardsdatascience.comยท1d
๐ŸŒŠStream Processing
Building an AI-Powered Lead Gen Workflow with n8n, Apify, and Gemini
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Archive Automation
North Koreaโ€™s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.devยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.comยท1d
๐ŸŽฏThreat Hunting
Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks
darkreading.comยท1d
๐Ÿ”“Hacking
Ask HN: Do you have some rare internet(s) history to share?
news.ycombinator.comยท18hยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
RecGen: a powerful tool to create recommendation systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Constraint Handling