Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.bizยท1d
๐กCybersecurity
Flag this post
This Month in Ladybird โ October 2025
๐ฌWebCodecs
Flag this post
Why (and How) I Still Use Time Machine to Back Up My Mac
lifehacker.comยท23h
๐Apple Archive
Flag this post
Using vimwiki as a personal, portable, knowledge base
neilzone.co.ukยท3h
๐ฑPersonal Wikis
Flag this post
Show HN: Pion/rtwatch โ Watch video in sync with friends, pause/seek on back end
๐WebRTC Archives
Flag this post
VisualDiffer Released Open Source
๐บZIP Archaeology
Flag this post
DiffPace: Diffusion-based Plug-and-play Augmented Channel Estimation in mmWave and Terahertz Ultra-Massive MIMO Systems
arxiv.orgยท1d
๐ง Machine Learning
Flag this post
Every Sunday, I Refactor Old Code and Itโs the Smartest Habit Iโve Ever Built
๐Reverse engineering
Flag this post
Deciphering Human Language for Machines: A Developer's Guide to NLP
๐คGrammar Induction
Flag this post
3 Costliest AI Prompt Mistakes Killing Python Productivity (Fixes)
๐Shell Automation
Flag this post
pg_stat_plans: Track per-plan call counts, execution times and EXPLAIN texts
๐งฌPostgreSQL Forensics
Flag this post
How I Built gemini-imagen: A CLI for Google Gemini Image Generation
๐คArchive Automation
Flag this post
Agentic World Modeling for 6G: Near-Real-Time Generative State-Space Reasoning
arxiv.orgยท1d
๐ง Machine Learning
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.orgยท2d
๐ก๏ธWASM Sandboxing
Flag this post
Auditable-choice reframing unlocks RL-based verification for open-ended tasks
arxiv.orgยท1d
๐Linear Logic
Flag this post
Loading...Loading more...