The Making of Myst, remastered
blog.zarfhome.comยท21h
๐Ÿ“ผRetro Games
Ivanti Mobile MDM Exploited Through Chained Zero-Day
zimperium.comยท1d
๐Ÿ›ก๏ธARM TrustZone
god shut up about AI, part 32 — open etiquette
oblomovka.comยท5hยท
๐ŸŽ™๏ธWhisper
Britainโ€™s closest neighbour, the European Union, is under attack
the-independent.comยท2h
๐Ÿ›๏ธEastern European Computing
Assassins, spies, and saboteurs in the eyes of the West; heroes in Russia
english.elpais.comยท23h
๐Ÿ”Polish Cryptanalysis
original โ†—
lmika.orgยท13h
๐Ÿ”—Concatenative Programming
Metasploit Wrap-Up 10/03/2025
rapid7.comยท18h
๐Ÿ›ก๏ธCLI Security
Learning Python Programming โ€ข Fabrizio Romano & Naomi Ceder โ€ข GOTO 2025
youtube.comยท2d
๐Ÿ”—Concatenative Programming
From nothing, everything
aeon.coยท1dยท
Discuss: Hacker News
๐Ÿ›๏ธPhilosophy
Protecting consumers in a post-consent world
stanfordlawreview.orgยท17mยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Turbocharge Your Wireless: AI-Powered Tensor Precoding Unveiled!
dev.toยท2hยท
Discuss: DEV
๐Ÿง Neural Codecs
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
arxiv.orgยท1d
๐Ÿ•ต๏ธVector Smuggling
The Frozen Collection Vault: frozenset and Set Immutability
dev.toยท3dยท
Discuss: DEV
๐ŸŽž๏ธTape Combinatorics
Lazy imports using wrapt
grahamdumpleton.meยท6h
๐Ÿฆ€Rust Macros
Probabilistic Pauli-X Gate Fidelity Enhancement via Adaptive Quantum Annealing Calibration
dev.toยท2dยท
Discuss: DEV
โš›๏ธQuantum Error Correction
LLM Code Review vs. Deterministic SAST Security Tools
blog.fraim.devยท1dยท
Discuss: Hacker News
โšกProof Automation
Building a List in C++ โ€“ LLM Part 1
amitav.netยท2dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Superficial Safety Alignment Hypothesis
arxiv.orgยท1d
๐Ÿ’พBinary Linguistics
Issue 492
haskellweekly.newsยท2dยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers