A small rant about compression
codecs.multimedia.cx·2d
📦Deflate
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.org·12h·
Discuss: Hacker News
📟Terminal Typography
Sorting encrypted data without decryption: a practical trick
dev.to·13h·
Discuss: DEV
🔐Hash Functions
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·1d
🖼️JPEG XL
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com·22h
📼Tape Simulation
An enough week
blog.mitrichev.ch·1d·
📈Linear programming
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·19h
💎Information Crystallography
A gentle introduction to Generative AI: Historical perspective
medium.com·4h·
Discuss: Hacker News
🧠Learned Codecs
Metasploit Wrap Up 10/09/2025
rapid7.com·1d
🛡️eBPF Security
Meta Unveils OpenZL: A New Open Source Data Compression Framework
linuxiac.com·1d
Modern Compression
The Why of PGP Authentication
articles.59.ca·16h
🔑Cryptographic Protocols
Printing Petscii Faster
retrogamecoders.com·6h·
Discuss: Hacker News
📺VT100
Computer vision AI VTI’s against Phishing
vmray.com·2d
👁️Perceptual Hashing
Three ways formally verified code can go wrong in practice
buttondown.com·11h
📜Proof Carrying Code
[P] Lossless compression for 1D CNNs
reddit.com·18h·
📊Quantization
A disenshittification moment from the land of mass storage
doctorow.medium.com·16h
🧲Magnetic Philosophy
The Day I Hacked XCTrack
blog.syrac.org·14h·
Discuss: Hacker News
🔐PKI Archaeology