Online activities 6 โ€“ 12 October
ests.wordpress.comยท19h
๐Ÿ—๏ธConstructive Mathematics
Googles CodeMender is designed to automatically find and fix security flaws in software
the-decoder.comยท13h
๐ŸงฎZ3 Solver
Detection Engineering: Practicing Detection-as-Code โ€“ Monitoring โ€“ Part 7
blog.nviso.euยท19h
๐ŸšจIncident Response
InfoSec News Nuggets 10/07/2025
aboutdfir.comยท13h
๐Ÿ”“Hacking
A quiet change to RSA
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฑGalois Cryptography
The Neuron That Wanted to Be God
thealgorithmicbridge.comยท11h
๐Ÿ”ฒCellular Automata
State-Compute Replication: Parallelizing High-Speed Stateful Packet Processing
danglingpointers.substack.comยท13hยท
Discuss: Substack
๐Ÿ“กNetwork Stack
Petri: An open-source auditing tool to accelerate AI safety research \ Anthropic
anthropic.comยท1dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Thin Bridges for Drug Text Alignment: Lightweight Contrastive Learning for Target Specific Drug Retrieval
arxiv.orgยท23h
๐ŸŒ€Differential Geometry
Meta-Awareness Enhances Reasoning Models: Self-Alignment Reinforcement Learning
arxiv.orgยท23h
๐Ÿง Intelligence Compression
Order from disordered proteins: Physics-based algorithm designs biomolecules with custom properties
phys.orgยท1d
๐ŸงฌPalindrome Codes
Automated Spectral Deconvolution & Peak Profiling for Bioprocess Monitoring
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„Document Digitization
Homophily-induced Emergence of Biased Structures in LLM-based Multi-Agent AI Systems
arxiv.orgยท1d
๐Ÿ”ฒCellular Automata
AI in Cybersecurity: The Ultimate Guide to Threats & Defense in 2025
dev.toยท17hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
SliceMoE: Routing Embedding Slices Instead of Tokens for Fine-Grained and Balanced Transformer Scaling
arxiv.orgยท23h
๐ŸงฎKolmogorov Complexity
Generalized rational Prony and Bernoulli methods
arxiv.orgยท23h
๐ŸŽผAudio Lambda Calculus