The Prime Minister Who Tried to Have a Life Outside the Office
newyorker.comΒ·6h
❄️Nordic Design Philosophy
Swedes stock up on food as fears of war deepen
thelocal.seΒ·2d
πŸ‡ΈSweden
Best infosec-related long reads for the week of 9/27/25
metacurity.comΒ·2d
πŸ›‘Cybersecurity
Chess.com Regional Pricing: A Case Study
mobeigi.comΒ·4hΒ·
Discuss: Hacker News
🌐DNS over QUIC
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.comΒ·3d
πŸ΄β€β˜ οΈPiracy
AI has found 50 bugs in cURL. "AI-native SASTs work well"
etn.seΒ·4hΒ·
Discuss: Hacker News
πŸ§ͺProtocol Fuzzing
Impro: Palantir's Weirdest Book Recommendation
generalist.comΒ·21hΒ·
🧠Personal Knowledge Base
When AI Turns Culture into Slop
link.springer.comΒ·4hΒ·
Discuss: Hacker News
πŸ›Digital humanities
Python is adding Zstandard to the standard library in 3.14
discuss.python.orgΒ·6hΒ·
Discuss: Hacker News
πŸ“šLempel-Ziv
Sonne 4.5 keeps blowing my mind
curzel.itΒ·1dΒ·
Discuss: Hacker News
πŸ”’Linear Types
On The Fragility of Benchmark Contamination Detection in Reasoning Models
arxiv.orgΒ·12h
πŸ§ͺHardware Fuzzing
Assessment Twins: A Protocol for AI-Vulnerable Summative Assessment
arxiv.orgΒ·12h
πŸ”²Cellular Automata
Progressive Bound Strengthening via Doubly Nonnegative Cutting Planes for Nonconvex Quadratic Programs
arxiv.orgΒ·12h
🎯Performance Proofs
Real-Time Intrusion Detection via Quantum-Inspired Anomaly Scoring in Autonomous Vehicle Networks
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”Quantum Security
Mastering Google Dorking: Discovering Website Vulnerabilities
infosecwriteups.comΒ·1d
πŸ”“Hacking
πŸš€ Day 36 of My Data Journey
dev.toΒ·2hΒ·
Discuss: DEV
πŸ§ͺData science
An Senegalese Legal Texts Structuration Using LLM-augmented Knowledge Graph
arxiv.orgΒ·12h
πŸ“‹Document Grammar
Geometry Meets Vision: Revisiting Pretrained Semantics in Distilled Fields
arxiv.orgΒ·12h
πŸŒ€Differential Geometry