The Making of Myst, remastered
blog.zarfhome.com·15h
📼Retro Games
Ivanti Mobile MDM Exploited Through Chained Zero-Day
zimperium.com·18h
🛡️ARM TrustZone
original ↗
lmika.org·7h
🔗Concatenative Programming
Ants Trapped in a Soviet Nuclear Bunker Survived for Years
sciencealert.com·14h·
Discuss: Hacker News
🔍Polish Cryptanalysis
Micro Code Generator
hackster.io·1d
⚙️RISC-V Microcode
Metasploit Wrap-Up 10/03/2025
rapid7.com·13h
🛡️CLI Security
Prussian Blue
johncarlosbaez.wordpress.com·19h·
Discuss: Hacker News
Time Crystals
How Simple IDs Can Leak Your Secrets
dev.to·11h·
Discuss: DEV
🔤EBCDIC Privacy
Math Is the Bridge: Axiom's Signal Flare and the Coming Reasoning Renaissance
zakelfassi.com·19h·
Discuss: Hacker News
⚙️Proof Engineering
EEFSUVA: A New Mathematical Olympiad Benchmark
arxiv.org·1d
🎯Performance Proofs
The First Programming Language: A Timeline
tuple.nl·16h·
Discuss: Hacker News
📊APL Heritage
When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·1d·
Discuss: Hacker News
📼Cassette Hacking
PEP 810: Explicit Lazy Imports
discuss.python.org·15h·
🌳Incremental Parsing
Luke Plant: Breaking “provably correct” Leftpad
lukeplant.me.uk·2d
λLambda Encodings
Ghosts of Unix Past: a historical search for design patterns (2010)
lwn.net·1d·
🏠Homelab Archaeology
CLUE: Non-parametric Verification from Experience via Hidden-State Clustering
arxiv.org·1d
🧠Machine Learning
AI Under the Hood Part I: Understanding the Machine
kennethwolters.com·20h·
Discuss: Hacker News
📼Cassette Combinators
Primitive Overloading
mlochbaum.github.io·2d·
📊APL Heritage
I/Q Data for Dummies
whiteboard.ping.se·2d·
Discuss: Hacker News
📊Frequency Analysis