Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·23h·
Discuss: Hacker News
🔢Reed-Solomon Math
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.com·12h
🏠Homelab Federation
The Why of PGP Authentication
articles.59.ca·10h
🔑Cryptographic Protocols
7-Zip: Information on closed security gaps available
heise.de·12h
💣ZIP Vulnerabilities
People rescuing forgotten knowledge trapped on old floppy disks
bbc.com·11h·
Discuss: Hacker News
📼Cassette Archaeology
What's your workflow to pass cloud secrets/config metadata to apps safely?
news.ycombinator.com·18h·
Discuss: Hacker News
🔄Archival Workflows
A Manifesto for the Programming Desperado
github.com·7h·
Discuss: Hacker News
💻Programming languages
Experimenting with ACL2 and Claude Code
mikedodds.org·11h·
Discuss: Hacker News
👑Isabelle
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.to·1h·
Discuss: DEV
⚙️Proof Engineering
Controlled Release of Microorganisms from Engineered Living Materials
pubs.acs.org·8h·
Discuss: Hacker News
📦METS Packaging
Is the End of Detection-Based Security Here?
thenewstack.io·7h
🎯Threat Hunting
The Library Method: Understanding @cache
dev.to·22h·
Discuss: DEV
Cache Theory
Synology walks back HDD/SSD lock-in policy
taoofmac.com·1d
🔌Operating system internals
10 Data + AI Observations for Fall 2025
towardsdatascience.com·9h
🌊Stream Processing
How Do SSDs Work?
extremetech.com·11h·
Discuss: Hacker News
🧲Magnetic Recording
Ship Broken Things
matmul.net·1d·
Discuss: Hacker News
🔗Topological Sorting
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Implementing ZADD If Key Exists
rozumem.xyz·18h·
Discuss: Hacker News
Redis Internals