Thumbing through the DNS Trail of the TAOTH Campaign
circleid.comยท1d
๐Ÿ“กDNS Archaeology
Windows/WSL hardware ssh & gpg keys
blog.dan.drown.orgยท8h
๐Ÿ”’Hardware Attestation
LineageOS 23
lineageos.orgยท1dยท
๐Ÿ”“Open Source Software
Ship Broken Things
matmul.netยท3dยท
Discuss: Hacker News
๐Ÿ”—Topological Sorting
Duct Tape DSLs: Model Routing, Structured Outputs, and Typed Tools
lowlevelmagic.ioยท5dยท
Discuss: Hacker News
๐ŸงฉWASM Components
API Attack Awareness: Injection Attacks in APIs โ€“ Old Threat, New Surface
lab.wallarm.comยท4d
๐Ÿ”“LDAP Injection
How to Use AI to Learn Bug Hunting & Cybersecurity Like a Pro (in 2025)
infosecwriteups.comยท5h
โšกProof Automation
Unlocking 3D Worlds: How Differentiable Rendering Bridges AI and Graphics
dev.toยท7hยท
Discuss: DEV
๐Ÿ“Projective Geometry
Quantum Autonomy: Algorithms That Design Themselves by Arvind Sundararajan
dev.toยท1dยท
Discuss: DEV
โš›๏ธQuantum Algorithms
Fueling the Future: How Big Data and AI are Unlocking Green Hydrogen's Potential
dev.toยท6hยท
Discuss: DEV
๐ŸŒŠStream Processing
Open Lineage
usenix.orgยท3d
๐Ÿ”ŒInterface Evolution
Hierarchical Scheduling for Multi-Vector Image Retrieval
arxiv.orgยท9h
๐ŸงฎVector Embeddings
Re-Identifying K\={a}k\={a} with AI-Automated Video Key Frame Extraction
arxiv.orgยท9h
๐ŸŽž๏ธMKV Forensics
100 Poisoned Examples Can Hijack Any AI Model (Even GPT-4-Scale LLMs)
dev.toยท3dยท
Discuss: DEV
โšกProof Automation
Mastering Go Project Structure: Build Scalable & Maintainable Go Apps
dev.toยท18hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Java Backend Coding Technology: Writing Code in the Era of AI #Version 1.1
dev.toยท6dยท
Discuss: DEV
โšกSMT Applications
A Hybrid I/O Relation Estimation Scheme for Zak-OTFS Receivers
arxiv.orgยท9h
๐Ÿ’ŽInformation Crystallography
Building A Real-Time Communication System Using Go and WebSocket
dev.toยท2dยท
Discuss: DEV
๐ŸŒWebSocket Framing
End-to-end testing of Gen AI Apps
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Concolic Testing