Oct 29 2025 : Build Your Own ArduTouch Synthesizer Workshop
nycresistor.comยท12h
๐ŸŽนMIDI Archaeology
Things I Wrote: Slow terminal emulation
blog.oddbit.comยท2d
๐Ÿ“ŸTerminals
Thumbing through the DNS Trail of the TAOTH Campaign
circleid.comยท14h
๐Ÿ“กDNS Archaeology
'Happy Gilmore' Producer Buys Spyware Maker NSO Group
wired.comยท20h
๐Ÿ”“Hacking
X-Copy on the Amiga
spillhistorie.noยท17hยท
๐Ÿ•น๏ธGame Preservation
Parallelizing Cellular Automata with WebGPU Compute Shaders
vectrx.substack.comยท1dยท
Discuss: Substack
๐Ÿ”ฒCellular Automata
A Guide for WireGuard VPN Setup with Pi-Hole Adblock and Unbound DNS
psyonik.techยท10hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Real Programmers Don't Use Pascal (1982)
ee.torontomu.caยท3dยท
Discuss: Hacker News
๐Ÿ—๏ธCompiler Archaeology
Not Another GPT Wrapper
genorimo.comยท39mยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Building Luca: An AI Agent for Finance and Accounting Workflows
leapfin.comยท12hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
A Casio Toy Synth Is Ready To ROCK!
hackaday.comยท13h
๐ŸŽตGameboy Sound
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.toยท1dยท
Discuss: DEV
โš™๏ธProof Engineering
Apple expands bug bounty programme, gives up to 2 million dollars
heise.deยท1d
๐Ÿ”“Hacking
Building the Reasoning Engine at Axiom
axiommath.aiยท1dยท
Discuss: Hacker News
โš”๏ธLean Tactics
My BTL1 Review
infosecwriteups.comยท1d
๐Ÿ”Certificate Analysis
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.orgยท2d
โœจEffect Handlers
Show HN: Compression-Resistant Data Transfers
github.comยท21mยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWebP Analysis
State of Opinion โ€“ Programming Languages โ€“ Autumn 2025 Edition
xlii.spaceยท17hยท
Discuss: Hacker News
๐Ÿ”—Concatenative Languages
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท1d
๐Ÿ”—Hash Chains