A Fight Over Maps
nytimes.comยท2h
๐ŸŽฏProof Tactics
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.comยท29m
๐Ÿ“กFeed Security
Flag this post
Whisper Into This AI-Powered Smart Ring to Organize Your Thoughts
wired.comยท1d
๐ŸŽ›๏ธFeed Filtering
Flag this post
Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.bizยท1d
๐Ÿ›กCybersecurity
Flag this post
Evaluating digital forensic findings in Trojan horse defense cases using Bayesian networks
sciencedirect.comยท4h
๐Ÿ—œ๏ธZIP Forensics
Flag this post
Prentice Hall Interview with Rich Stevens, Author of Unix Programming (1997)
kohala.comยท4hยท
Discuss: Hacker News
๐Ÿ› Language Design
Flag this post
A PoC to make a backdoored PyTorch neural network
hacktelligence.orgยท15hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Flag this post
We found embedding indexing bottleneck in the least expected place: JSON parsing
nixiesearch.substack.comยท2dยท
Discuss: Substack
๐ŸŒณTrie Structures
Flag this post
Cyclic Proofs for iGL via Corecursion
arxiv.orgยท1d
๐Ÿ‘‘Coq Tactics
Flag this post
A filtering scheme for confocal laser endomicroscopy (CLE)-video sequences for self-supervised learning
arxiv.orgยท2d
๐ŸŒ€Riemannian Computing
Flag this post
OpenAI RAG Starter Kit with File Search and Chat UI
github.comยท5hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Flag this post
Consistently Simulating Human Personas with Multi-Turn Reinforcement Learning
arxiv.orgยท2d
๐Ÿ“ŠLearned Metrics
Flag this post
Towards Automated Petrography
arxiv.orgยท2d
๐Ÿค–Paleographic Automation
Flag this post
Detached agent chains that work like people do
dev.toยท15hยท
Discuss: DEV
โšกProof Automation
Flag this post