An MVCC-like columnar table on S3 with constant-time deletes
shayon.dev·11h·
Discuss: Hacker News
🔗Archive Combinators
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
News for September 2025
ptreview.sublinear.info·20h
🧪Property-Based Testing
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.com·2d
🌳Archive Merkle Trees
How to Train an LLM to Do Proofs: Beyond Verifiable Rewards
tobysimonds.com·7h·
Discuss: Hacker News
🎯Interactive Provers
Ask HN: Systems Development Path
news.ycombinator.com·17h·
Discuss: Hacker News
🦀Rust Borrowing
Smart Specs: Automating Engineering Standards for Error-Free Design
vibe.forem.com·3h·
Discuss: DEV
📋Format Specification
DanielSant0s/AthenaEnv
github.com·4h
📺VT100 Emulation
Question: How to transfer information from one custom resource to another while not falling victim to concurrency.
reddit.com·1d·
Discuss: r/kubernetes
📦CBOR Extensions
sopass and cross-device syncing in a password manager
blog.liw.fi·1d
🔀CRDT
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·2d
🔧Binary Parsers
Plugin Secure
rya.nc·19h·
Discuss: Hacker News
Checksum Validation
Litestream v0.5.0 is Here
simonwillison.net·1d
🔄Sync Engine
AKF: A modern synthesis framework for building datasets in digital forensics
sciencedirect.com·20h
🔍FLAC Forensics
I tested the Lexar Workflow Go and it’s now essential to my on-location shoots
techradar.com·9h
🔄Archival Workflows
Fun with HyperLogLog and SIMD
vaktibabat.github.io·19h·
📊HyperLogLog
Eliminating the Precision–Latency Trade-Off in Large-Scale RAG
thenewstack.io·1d
🎯Retrieval Systems
Atomic and Saturated Models
functor.network·1d·
Discuss: Hacker News
🔢Denotational Semantics
Restoring Reliability in the AI-Aided Software Development Life Cycle
cacm.acm.org·1d
📏Code Metrics
Metasploit Wrap-Up 10/03/2025
rapid7.com·1d
🛡️CLI Security