Stripped of Myths
nybooks.comยท4d
โ„๏ธNordic Design Philosophy
Best infosec-related long reads for the week of 9/27/25
metacurity.comยท2d
๐Ÿ›กCybersecurity
Sampling at Negative Temperature
cavendishlabs.orgยท1dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
I have created a tutorial on how to install Mint with BTRFS and Full Disk Encryption!
gist.github.comยท1dยท
Discuss: r/linux
๐Ÿ”’Secure Boot
โ€˜A collective anxiety attackโ€™: the psychology of unexplained drone sightings across Europe
theguardian.comยท1d
๐ŸŽฏThreat Hunting
AI has found 50 bugs in cURL. "AI-native SASTs work well"
etn.seยท9hยท
Discuss: Hacker News
๐ŸงชProtocol Fuzzing
Forget Data Ethics โ€” The Real Battle Is Over Who Owns the Infrastructure
hackernoon.comยท18h
๐ŸงฒMagnetic Philosophy
When AI Turns Culture into Slop
link.springer.comยท9hยท
Discuss: Hacker News
๐Ÿ›Digital humanities
So You Wanna Shitpost: A Creator's Guide to Weaponized Nonsense
com.manychat.comยท4hยท
Discuss: Hacker News
๐ŸŽฏContent Recommendation
Python is adding Zstandard to the standard library in 3.14
discuss.python.orgยท11hยท
Discuss: Hacker News
๐Ÿ“šLempel-Ziv
Impro: Palantir's Weirdest Book Recommendation
generalist.comยท1dยท
๐Ÿง Personal Knowledge Base
PRISM-Physics: Causal DAG-Based Process Evaluation for Physics Reasoning
arxiv.orgยท18h
โœจEffect Handlers
๐Ÿš€ Day 36 of My Data Journey
dev.toยท8hยท
Discuss: DEV
๐ŸงชData science
Automated Anomaly Detection in Industrial Control Systems via Dynamic Graph Neural Network Pruning
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Data-Driven Stochastic Distribution System Hardening Based on Bayesian Online Learning
arxiv.orgยท18h
๐Ÿง Machine Learning
Automated Predictive Maintenance Optimization via Hybrid Bayesian-Markovian Modeling for Tunnel Boring Machines (TBMs)
dev.toยท17hยท
Discuss: DEV
โš™๏ธProof Engineering
Q-Learning with Shift-Aware Upper Confidence Bound in Non-Stationary Reinforcement Learning
arxiv.orgยท18h
๐ŸงฎKolmogorov Bounds
CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
tenable.comยท19h
๐Ÿ”“Hacking