Closing the gaps in identity security with device intelligence
fingerprint.com·16h
🎯Threat Hunting
Flag this post
Bill Gates calls AI "the biggest technical thing ever in my lifetime," but warns of a bubble
the-decoder.com·15h
🤖AI Curation
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
AI-Driven, Quantum-Ready Network Security
paloaltonetworks.com·2d
🏠Homelab Security
Flag this post
Internetcu.be: Let's Build a Free, Neutral and Decentralized Internet Together
🖥️Self-hosted Infrastructure
Flag this post
Hyperlogloglog (2016)
🏴Scottish Computing
Flag this post
Context engineering
🧠Intelligence Compression
Flag this post
Reasoning Curriculum: Bootstrapping Broad LLM Reasoning from Math
arxiv.org·6h
📝ABNF Extensions
Flag this post
Beyond Models: A Framework for Contextual and Cultural Intelligence in African AI Deployment
arxiv.org·1d
🌍Cultural Algorithms
Flag this post
Show HN: sjl – Simple JSON Logger for Rust
🔐CBOR
Flag this post
Unsupervised Machine-Learning Pipeline for Data-Driven Defect Detection and Characterisation: Application to Displacement Cascades
arxiv.org·2d
💾Floppy Imaging
Flag this post
Temporal Blindness in Multi-Turn LLM Agents: Misaligned Tool Use vs. Human Time Perception
arxiv.org·2d
⏱️Interval Parsing
Flag this post
Accelerated Core Black Hole Accretion Modeling via Bayesian Hierarchical Neural Networks
🧠Learned Codecs
Flag this post
Recognizing internal states in AI: evidence from patterned preferences in large language models
arxiv.org·3d
🤖Automated Parsing
Flag this post
Boundaries of Acceptable Defectiveness: Redefining Surface Code Robustness under Heterogeneous Noise
arxiv.org·3d
⚛️Quantum Error Correction
Flag this post
Dual-Mind World Models: A General Framework for Learning in Dynamic Wireless Networks
arxiv.org·2d
🧠Machine Learning
Flag this post
Loading...Loading more...