I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·1d
🔓Hacking
CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection
bitsight.com·2d
🧪CBOR Fuzzing
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·3d
🌐WARC Forensics
GitHub Copilot 'CamoLeak' AI Attack Exfiltrates Data
darkreading.com·2d
🚀Indie Hacking
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·3d
📺VT100
The movie method for getting into Stanford
chrisbarber.co·9h·
Discuss: Hacker News
🎞️Video Archives
Terraform Fileset Function: Filter and Deploy Specific Files
spacelift.io·1d·
Discuss: Hacker News
🧊Arctic Storage
Steve Jobs Signed 1988 NExt Inc. Memo Autograph Founder CEO
yourownmuseum.com·1d·
Discuss: Hacker News
🍎Apple Computing
Why Low-Precision Transformer Training Fails: An Analysis on Flash Attention
huggingface.co·2d·
Discuss: Hacker News
📊Learned Metrics
Slip – A Lisp System in JavaScript
lisperator.net·1d·
Discuss: Hacker News
🔗Lisp
Stable ferroaxial states offer a new type of light-controlled non-volatile memory
phys.org·1d
⚛️Quantum Tape
Covert Quantum Learning: Privately and Verifiably Learning from Quantum Data
arxiv.org·2d
🔐Quantum Cryptography
Ship Broken Things
matmul.net·2d·
Discuss: Hacker News
🔗Topological Sorting
Markdown2pdf – pure md to pdf transpiler implementation in Rust
github.com·1d·
Discuss: Hacker News
📄PDF Internals
JEPAs: Unveiling the Hidden Density Oracle Within by Arvind Sundararajan
dev.to·3d·
Discuss: DEV
🧠Machine Learning
Running new applications on old glibc
lightofdawn.org·2d·
Discuss: Hacker News
🔗Static Linking
In-Depth Analysis: "Attention Is All You Need"
dev.to·1d·
Discuss: DEV
🧠Intelligence Compression
Revisiting Karpathy's 'Unreasonable Effectiveness of Recurrent Neural Networks'
gilesthomas.com·23h·
Discuss: Hacker News
🎧Learned Audio
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds