sopass and cross-device syncing in a password manager
blog.liw.fi·2d
🔀CRDT
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.com·2d
🏴‍☠️Piracy
The dangerous intimacy of social location sharing
joinreboot.org·8h·
Discuss: Hacker News
🧲Magnetic Philosophy
TurtleSPACES – Learn to Code in a Visual World Where Creativity Meets Logic
turtlespaces.org·16h·
Discuss: Hacker News
📐Mathematical Art
Title: A Comprehensive Guide to Learning Python for Machine Learning
dev.to·1d·
Discuss: DEV
🧠Machine Learning
On This Day in Math - October 5
pballew.blogspot.com·1d·
📜Manuscript Algebras
A Deep Dive Into Python Dictionaries
dev.to·2d·
Discuss: DEV
🗂Data structures
Real-Time Intrusion Detection via Quantum-Inspired Anomaly Scoring in Autonomous Vehicle Networks
dev.to·2d·
Discuss: DEV
🔐Quantum Security
How to Train an LLM to Do Proofs: Beyond Verifiable Rewards
tobysimonds.com·1d·
Discuss: Hacker News
🎯Interactive Provers
An Senegalese Legal Texts Structuration Using LLM-augmented Knowledge Graph
arxiv.org·2h
📋Document Grammar
Hackers claim to have hit third-part provider for Boeing, Samsung and more
techradar.com·2d
🔓Hacking
A ‘magic pill’ made Israeli violence invisible. We need to stop swallowing it | Diana Buttu
theguardian.com·17h
🎫Kerberos Attacks
Embracing the parallel coding agent lifestyle
simonw.substack.com·5h·
Discuss: Substack
🌳Incremental Parsing
Reimplementing PKCS#11 Module
blog.ubavic.rs·2d·
Discuss: Hacker News
🔐CBOR
The Geek Code (1993)
github.com·1d·
Discuss: Hacker News
📜Binary Philology
Variational Secret Common Randomness Extraction
arxiv.org·3d
🧮Kolmogorov Complexity
EEFSUVA: A New Mathematical Olympiad Benchmark
arxiv.org·3d
🎯Performance Proofs
Q-Learning with Shift-Aware Upper Confidence Bound in Non-Stationary Reinforcement Learning
arxiv.org·2h
🧮Kolmogorov Bounds