[Guest post] The Birkenstock saga continues: Dutch court acknowledges copyright protection in sandal designs
ipkitten.blogspot.com·5h·
❄️Nordic Design Philosophy
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·3d
🔎OSINT Techniques
Flag this post
Show HN: AI Watermarkremover
aiwatermarkremover.online·8h·
Discuss: Hacker News
🤖AI Paleography
Flag this post
【libxml2】libxml2プロジェクトは放棄されました #Security - Qiita
qiita.com·2d
🇯🇵Japanese Computing
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·2d
🚨Incident Response
Flag this post
Gitoxide in November
github.com·19h·
Discuss: r/rust
📦Git LFS
Flag this post
Apple's Problem with Bodies
drobinin.com·1d·
Discuss: Hacker News
🌀Brotli Dictionary
Flag this post
Show HN: TriView Explorer – Multi-pane file explorer for deep folders
news.ycombinator.com·15h·
Discuss: Hacker News
Bidirectional Programming
Flag this post
How Wipro PARI accelerates PLC code generation using Amazon Bedrock
aws.amazon.com·1d
⚙️PL Implementation
Flag this post
Evaluating Web Browsing Agents for Some Practical Use Cases
theautomatedoperator.substack.com·1d·
Discuss: Substack
🕵️Feed Discovery
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.com·1d
📝Concrete Syntax
Flag this post
Built Bittorrent in go
reddit.com·1d·
Discuss: r/golang
🌊BitTorrent
Flag this post
Information Literacy and Chatbots as Search
buttondown.com·17h·
Discuss: Hacker News
📰RSS Reading Practices
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
dev.to·7h·
Discuss: DEV
🧅Tor Networks
Flag this post
FAWK: LLMs can write a language interpreter
martin.janiczek.cz·2d·
🦀Rust Macros
Flag this post
Letting coding agents access runtime output (my current approach)
foundinglean.substack.com·14h·
Discuss: Substack
👁️System Observability
Flag this post
The Secret Life of Go
dev.to·1d·
Discuss: DEV
🎯Gradual Typing
Flag this post
Ask HN: Looking for a donated PC or laptop for freelance work
news.ycombinator.com·3h·
Discuss: Hacker News
🍎Apple Computing
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.org·2d
🤖Advanced OCR
Flag this post
Peer-to-peer ephemeral public communities
getaether.net·2d·
Discuss: Hacker News
🌐WebRTC Archives
Flag this post