The Last Walkman Sold in America
obsoletesony.substack.comΒ·4hΒ·
Discuss: Substack
πŸ“ΌCassette Archaeology
How DNS Actually Works
blog.algomaster.ioΒ·2d
🌐DNS Security
Kefir: A new C17/C23 compiler for amd64 Unix
kefir.protopopov.lvΒ·2hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
Farewell to the fediverse
manualdousuario.netΒ·8hΒ·
Discuss: Hacker News
πŸ“‘RSS Automation
The Illusion of Moral Superiority
pmc.ncbi.nlm.nih.govΒ·4hΒ·
Discuss: Hacker News
πŸ”²Proof Irrelevance
Yes, Your Passkeys Can Be Hacked–New Attack 'Breaks the Myth'
forbes.comΒ·8hΒ·
Discuss: Hacker News
πŸ”“Hacking
Show HN: TrustGlance – See any business's trust level in seconds
trustglance.comΒ·2dΒ·
Discuss: Hacker News
🎯Content Recommendation
Your Brain on ChatGPT
klementoninvesting.substack.comΒ·4hΒ·
Discuss: Substack
πŸ“ΌTape Linguistics
Building a DOOM-like multiplayer shooter in pure SQL
cedardb.comΒ·5dΒ·
🧬PostgreSQL Forensics
Richard Feynman and the Connection Machine
longnow.orgΒ·2dΒ·
Discuss: Hacker News
🎞️Tape Combinatorics
Karate – Test Automation Made Simple
karatelabs.github.ioΒ·3dΒ·
Discuss: Hacker News
⚑Proof Automation
Taming Chaos with Antifragile GenAI Architecture
oreilly.comΒ·2d
πŸ”²Cellular Automata
Subdomain Discovery and Enumeration: From Noise to Valuable Targets
infosecwriteups.comΒ·12h
πŸ•΅οΈDomain Enumeration
Design Scanimations In a Snap With The Right Math
hackaday.comΒ·12h
πŸ“Mathematical Art
Humans as Bottleneck
shubhamg.bearblog.devΒ·3dΒ·
Discuss: Hacker News
🧠Intelligence Compression
Frankenstein Variant of the ToneShell Backdoor Targeting Myanmar
intezer.comΒ·2d
πŸ”“Hacking
Virtualizing Any GPU on AWS with HAMi: Free Memory Isolation
dev.toΒ·2dΒ·
Discuss: DEV
🌊Streaming Systems
JIGSAW PHOTO
dev.toΒ·1dΒ·
Discuss: DEV
πŸ•ΈοΈWebP Analysis
Otters 🦦 - A minimal vector search library with powerful metadata filtering
reddit.comΒ·4dΒ·
Discuss: r/rust
πŸ¦€Rust Macros
DuoCLR: Dual-Surrogate Contrastive Learning for Skeleton-based Human Action Segmentation
arxiv.orgΒ·4d
πŸŒ€Differential Geometry