Integer overflow checking with C23
blog.gnoack.orgยท12h
๐Ÿ’งLiquid Types
Flag this post
Fully-Specified Algorithms for JOSE and COSE is now RFC 9864
self-issued.infoยท3d
๐Ÿ”‘Cryptographic Protocols
Flag this post
This Unbreakable CIA Cipher Fooled the World for 37 Years. Then Two People Accidentally Solved It.
popularmechanics.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
Using the expand and contract pattern for schema changes
prisma.ioยท2dยท
Discuss: Hacker News
๐Ÿ”„Schema Evolution
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Flag this post
The ZeroAccess Developer and His Windows Kernel-Mode Debugger
r136a1.devยท16hยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Flag this post
Ajla Tutorial
ajla-lang.czยท3dยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Flag this post
GHC 9.14.1-rc1 is now available
discourse.haskell.orgยท2dยท
๐Ÿ”—Functional Compilers
Flag this post
Text rendering and effects using GPU-computed distances
blog.pkh.meยท1dยท
๐Ÿ“Mathematical Art
Flag this post
Reasoning Models Sometimes Output Illegible Chains of Thought
arxiv.orgยท3h
๐Ÿง Intelligence Compression
Flag this post
Cons Should Not Cons Its Arguments, Part II: Cheney on the MTA
web.archive.orgยท2hยท
Discuss: Hacker News
โฌ†๏ธLambda Lifting
Flag this post
DC4GS: Directional Consistency-Driven Adaptive Density Control for 3D Gaussian Splatting
arxiv.orgยท3h
๐Ÿ’ŽInformation Crystallography
Flag this post
From product to system network challenges in system of systems lifecycle management
arxiv.orgยท3h
๐Ÿฆ‹Format Metamorphosis
Flag this post
Building a GPT-5 Telegram Bot with Telegram Stars Monetization
dev.toยท1dยท
Discuss: DEV
โšกgRPC
Flag this post
Functional embeddings enable Aggregation of multi-area SEEG recordings over subjects and sessions
arxiv.orgยท3h
๐Ÿ“ŠLearned Metrics
Flag this post
Independent Auditing Framework for Algorithmic Fairness: A Dynamic Bayesian Network Approach
dev.toยท2dยท
Discuss: DEV
๐Ÿ”BitFunnel
Flag this post
RECOVER STOLEN BITCOIN - CLAIM BACK LOST CRYPTO INVESTMENT ACCOUNT META TECH RECOVERY PRO
dev.toยท11hยท
Discuss: DEV
๐Ÿ”BitFunnel
Flag this post
The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against LlmJailbreaks and Prompt Injections
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
Flag this post