Man held in Japan on suspicion of creating female celeb deepfakes made with AI
japantimes.co.jp·17h
🇯🇵Japanese Computing
Flag this post
These Tiny Robots Can Swarm, Adapt, and Heal Themselves
scitechdaily.com·9h
🔲Cellular Automata
Flag this post
Commanding attention: How adversaries are abusing AI CLI tools
redcanary.com·1d
🛡️CLI Security
Flag this post
The October 2025 Security Update Review
thezdi.com·1d
💣ZIP Vulnerabilities
Flag this post
FSF Announces the LibrePhone Project
news.slashdot.org·1d
🐧FOSS
Flag this post
Farming Hard Drives (2012)
🇸🇪Nordic Filesystems
Flag this post
Conflict-Free Replicated Data Types (CRDTs)
🔀CRDT
Flag this post
The data model behind notion
📦CBOR Extensions
Flag this post
Krish Naik: Advanced Agentic RAG And Its Types New Series-Generative AI
🧠Learned Codecs
Flag this post
Why You Should Be Using Git Worktrees
🌳Git Internals
Flag this post
Digital ID cards could be a disaster in the UK and beyond
newscientist.com·23h
🔐PKI Archaeology
Flag this post
How Meta Serverless Handles 11.5 Million Function Calls per Second
newsletter.systemdesign.one·1d
🌊Stream Processing
Flag this post
Delibasis, D. - The right to national self-defense. [Elektronisk resurs] : in information warfare operations / Dimitrios Delibasis.
libris.kb.se·1d
🔍Polish Cryptanalysis
Flag this post
Why C variable argument functions are an abomination (and what to do about it)
🔗Concatenative Programming
Flag this post
NV3D: Leveraging Spatial Shape Through Normal Vector-based 3D Object Detection
arxiv.org·2d
🏺Computational Archaeology
Flag this post
Hayden, Michael V. - Playing to the edge. [Elektronisk resurs] : American intelligence in the age of terror / Michael V. Hayden.
libris.kb.se·1d
🕵Intelligence
Flag this post
Automated Structural Health Monitoring via Acoustic Emission & Deep Reinforcement Learning
🏺Computational Archaeology
Flag this post
Loading...Loading more...