The Making of Myst, remastered
blog.zarfhome.com·18h
📼Retro Games
Ivanti Mobile MDM Exploited Through Chained Zero-Day
zimperium.com·21h
🛡️ARM TrustZone
Micro Code Generator
hackster.io·1d
⚙️RISC-V Microcode
original ↗
lmika.org·10h
🔗Concatenative Programming
Metasploit Wrap-Up 10/03/2025
rapid7.com·16h
🛡️CLI Security
AI Under the Hood Part I: Understanding the Machine
kennethwolters.com·23h·
Discuss: Hacker News
📼Cassette Combinators
Higher-Level Design Patterns
qouteall.fun·21h·
Discuss: Hacker News
Algebraic Effects
The Invisible Shield: Proving AI Image Provenance with Zero Knowledge by Arvind Sundararajan
dev.to·12h·
Discuss: DEV
🔍Vector Forensics
Primitive Overloading
mlochbaum.github.io·2d·
📊APL Heritage
The Molecular Revolution in Biology: The History, Structure, and Future
drchrisearl.substack.com·10h·
Discuss: Substack
🔲Cellular Automata
Authentication Security of PRF GNSS Ranging
arxiv.org·1d
🌊Stream Ciphers
Alibaba cloud FPGA: the $200 Kintex UltraScale+
essenceia.github.io·12h·
🔧FPGA Preservation
I've locked myself out of my digital life (2022)
shkspr.mobi·2d·
Discuss: Hacker News
🏠Personal Archives
Atomic and Saturated Models
functor.network·10h·
Discuss: Hacker News
🔢Denotational Semantics
Show HN: tstr - PEP 750 Template String Utilities & Backports
github.com·20h·
Discuss: Hacker News
📝Concrete Syntax
Classic 8×8-pixel B&W Mac patterns
pauladamsmith.com·3h·
Discuss: Hacker News
🖥️Vintage Macintosh
From nothing, everything
aeon.co·1d·
Discuss: Hacker News
🏛️Philosophy
Turbocharge Your Wireless: AI-Powered Tensor Precoding Unveiled!
dev.to·41m·
Discuss: DEV
🧠Neural Codecs
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
arxiv.org·1d
🕵️Vector Smuggling
The Frozen Collection Vault: frozenset and Set Immutability
dev.to·3d·
Discuss: DEV
🎞️Tape Combinatorics