What is the new EU border system EES, and how will it work?
theguardian.com·4h
🔤EBCDIC Privacy
simonw/claude-skills
simonwillison.net·1d
📄PostScript
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·3d
📺VT100
The ClickFix Factory: First Exposure of IUAM ClickFix Generator
unit42.paloaltonetworks.com·3d
🔍BitFunnel
Show HN: 1M retail interior image dataset for computer vision (UK/US/EU)
groceryinsight.com·1d·
Discuss: Hacker News
🏺Compression Museums
Exploring and comparing prominent Russian language cybercriminal forums
cybercrimediaries.com·20h·
Discuss: Hacker News
🔓Hacking
Strategic Pagination Patterns for APIs
roxeem.com·19h·
Discuss: Hacker News
📏Range Queries
Why Low-Precision Transformer Training Fails: An Analysis on Flash Attention
huggingface.co·3d·
Discuss: Hacker News
📊Learned Metrics
AI receptionist that answers real phone calls
news.ycombinator.com·1d·
Discuss: Hacker News
🎙️Whisper
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.org·2d
🕵️Vector Smuggling
MARC: Memory-Augmented RL Token Compression for Efficient Video Understanding
arxiv.org·2d
🧠Learned Codecs
Exposing Citation Vulnerabilities in Generative Engines
arxiv.org·3d
📜Digital Philology
Wireshark 4.4.10 and 4.6.0 Released, (Sun, Oct 12th)
isc.sans.edu·1h
Archive Fixity
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.to·1d·
Discuss: DEV
🔤Character Classification
The Bit Shift Paradox: How "Optimizing" Can Make Code 6× Slower
hackernoon.com·4d
🧮Compute Optimization
Randomized and quantum approximate matrix multiplication
arxiv.org·2d
🔐Quantum Cryptography
Random samples from a tetrahedron
johndcook.com·20h
💎Information Crystallography
Biology-driven assessment of deep learning super-resolution imaging of the porosity network in dentin
arxiv.org·2d
Information Bottleneck
Sora Watermark Remover
sorawatermarkremover.art·18h·
Discuss: Hacker News
📼Retro Games