Signal’s Post-Quantum Cryptographic Implementation
schneier.com·4d·
Discuss: Hacker News
🔒Security Engineering
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.com·3d
🔒Security Engineering
Flag this post
Weak-To-Strong Generalization
lesswrong.com·12h
🕸️WASM
Flag this post
Viruses of the Mind
grokipedia.com·2h·
Discuss: Hacker News
🤖AI
Flag this post
Machine Scheduler in LLVM – Part II
myhsu.xyz·9h·
Discuss: Hacker News
🦀Rust Systems
Flag this post
The cryptography behind electronic passports
blog.trailofbits.com·2d·
Discuss: Hacker News
🔒Security Engineering
Flag this post
Proof Connects Quantum Mechanics with Infinitely Intricate Math Structures
wired.com·1d·
Discuss: Hacker News
🪙cryptocurrency
Flag this post
Smaller Surfaces
nrempel.com·17h·
Discuss: Hacker News
🕸️WASM
Flag this post
Quantum Nanodiamonds from 1 Step, Industrial-Scale Pressure and Temp Process
advanced.onlinelibrary.wiley.com·2d·
Discuss: Hacker News
🪙cryptocurrency
Flag this post
De Bruijn Numerals
text.marvinborner.de·3d·
Discuss: Hacker News
💻Programming
Flag this post
State of the post-quantum Internet in 2025
blog.cloudflare.com·5d·
🪙cryptocurrency
Flag this post
Oops, My UUIDs Collided
alexsci.com·1d·
Discuss: Hacker News
🦀Rust Systems
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.com·2h·
Discuss: Hacker News
🔒Security Engineering
Flag this post
Generation at the Speed of Thought: Speculative Decoding
bittere.substack.com·4h·
Discuss: Substack
🦀Rust Systems
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.com·1d·
Discuss: Hacker News
🏛️Technical Architecture
Flag this post
Scientists Generate Matter Directly from Light (2021)
scitechdaily.com·4h·
Discuss: Hacker News
🪙cryptocurrency
Flag this post
Guide: TLS and QUIC
moq.dev·2d·
Discuss: Hacker News
🔒Security Engineering
Flag this post
Show HN: Molecular/Waveform Computing Unification
datamolecular.com·1d·
Discuss: Hacker News
🏛️Technical Architecture
Flag this post
Privacy Risks of 1x Neo Robot
captaincompliance.com·1d·
Discuss: Hacker News
🔒Security Engineering
Flag this post
Robust GNN Watermarking via Implicit Perception of Topological Invariants
arxiv.org·2d·
Discuss: Hacker News
🤖AI
Flag this post