[Guest post] The Birkenstock saga continues: Dutch court acknowledges copyright protection in sandal designs
❄️Nordic Design Philosophy
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·3d
🔎OSINT Techniques
Flag this post
Show HN: AI Watermarkremover
🤖AI Paleography
Flag this post
【libxml2】libxml2プロジェクトは放棄されました #Security - Qiita
qiita.com·2d
🇯🇵Japanese Computing
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·2d
🚨Incident Response
Flag this post
Apple's Problem with Bodies
🌀Brotli Dictionary
Flag this post
Show HN: TriView Explorer – Multi-pane file explorer for deep folders
⟷Bidirectional Programming
Flag this post
How Wipro PARI accelerates PLC code generation using Amazon Bedrock
aws.amazon.com·1d
⚙️PL Implementation
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.com·1d
📝Concrete Syntax
Flag this post
Built Bittorrent in go
🌊BitTorrent
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
🧅Tor Networks
Flag this post
FAWK: LLMs can write a language interpreter
🦀Rust Macros
Flag this post
Letting coding agents access runtime output (my current approach)
👁️System Observability
Flag this post
The Secret Life of Go
🎯Gradual Typing
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.org·2d
🤖Advanced OCR
Flag this post
Loading...Loading more...