Nov 15 2025 : Intro to Soldering Workshop: Make an LED Tile
nycresistor.com·1d
⚙️DIY Electronics
How the Math That Powers Google Foresaw the New Pope
scientificamerican.com·19h
⚖️Feed Ranking
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.com·1d
🏺Kerberos Archaeology
An enough week
blog.mitrichev.ch·2d·
📈Linear programming
Get ready for this
aardvark.co.nz·2d
📰RSS Archaeology
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·4d
🔢Reed-Solomon Math
Juniper Security Director: Attackers can bypass security mechanism
heise.de·19h
🔓Hacking
Is the End of Detection-Based Security Here?
thenewstack.io·1d
🎯Threat Hunting
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.com·1d·
Discuss: Hacker News
🧬PostgreSQL Forensics
Metascience Since 2012: A Personal History
goodscience.substack.com·8h·
Discuss: Substack
🎓Academic Torrents
Faking a Rational Design Process in the AI Era: Why Documentation Matters
albertsikkema.com·1d·
Discuss: Hacker News
⚙️Proof Engineering
Ask HN: Do you have some rare internet(s) history to share?
news.ycombinator.com·20h·
Discuss: Hacker News
📡DNS Archaeology
Intimate conversations with AI chatbots were visible to everyone
heise.de·18h
🔓Hacking
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.to·1d·
Discuss: DEV
🔗Supply Chain
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·3d·
Discuss: Hacker News
🛡️eBPF Security
Imagery HTB WriteUp: Season 9 Machine 2
infosecwriteups.com·2d
📟Terminal Forensics
Pacsea: Arch Package Manager TUI
github.com·2d·
Discuss: r/linux
❄️Nixpkgs
RecGen: a powerful tool to create recommendation systems
dev.to·1d·
Discuss: DEV
🔗Constraint Handling
Bayesian Optimization for Dynamic Sample Size Allocation in A/B Testing
dev.to·11h·
Discuss: DEV
🧮Kolmogorov Bounds
Building an AI-Powered Lead Gen Workflow with n8n, Apify, and Gemini
dev.to·1d·
Discuss: DEV
🤖Archive Automation