A small rant about compression
codecs.multimedia.cx·2d
📦Deflate
Sorting encrypted data without decryption: a practical trick
dev.to·4h·
Discuss: DEV
🔐Hash Functions
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·1d
🖼️JPEG XL
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·15h
📐Compression Bounds
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com·13h
📼Tape Simulation
An enough week
blog.mitrichev.ch·23h·
📈Linear programming
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
Meta Unveils OpenZL: A New Open Source Data Compression Framework
linuxiac.com·1d
Modern Compression
The Why of PGP Authentication
articles.59.ca·6h
🔑Cryptographic Protocols
Metasploit Wrap Up 10/09/2025
rapid7.com·23h
🛡️eBPF Security
Show HN: I made a Web based, Screen Studio for windows
videoyards.com·12h·
Discuss: Hacker News
🎬WebCodecs
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.com·5d
📟Terminal Typography
Computer vision AI VTI’s against Phishing
vmray.com·2d
👁️Perceptual Hashing
Three ways formally verified code can go wrong in practice
buttondown.com·2h
📜Proof Carrying Code
[P] Lossless compression for 1D CNNs
reddit.com·8h·
📊Quantization
A disenshittification moment from the land of mass storage
doctorow.medium.com·7h
🧲Magnetic Philosophy
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ing·11h
🏺ZIP Archaeology
The Day I Hacked XCTrack
blog.syrac.org·4h·
Discuss: Hacker News
🔐PKI Archaeology