๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฎ Verification Games

Theorem Proving, Gamified Formal Methods, Interactive Verification, Learning Tools

Rickrolling Turso DB (SQLite rewrite in Rust)
avi.imยท3dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”ฌStatic Analysis
iMessage integration in Claude can hijack the model to do anything
generalanalysis.comยท2dยท
Discuss: Hacker News
๐ŸŒNetworkProtocols
The Custom Tenant Code Nightmare (and How to Wake Up)
eloquentarchitecture.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Reproducible Builds
Vibe coding a Greek learning app without knowing Gree
mikeborozdin.comยท3dยท
Discuss: Hacker News
๐ŸŽApple
W3 AI Agent Protocol Community Group
w3.orgยท2dยท
Discuss: Hacker News
๐ŸŒNetworkProtocols
AI that can simulate billions of atoms simultaneously proves the feasibility of carbon-neutral concrete
phys.orgยท2dยท
Discuss: Hacker News
๐Ÿ’ปCS
Embive: A Secure Code Sandbox for Tiny Devices
medium.comยท1dยท
Discuss: r/programming
๐Ÿ“ฆUnikernel Systems
Type Checking with Symbolic Execution
bullno1.comยท4dยท
Discuss: Hacker News
๐Ÿ”ฌStatic Analysis
"The Bitter Lesson" is wrong. Well sort of
assaf-pinhasi.medium.comยท3dยท
Discuss: Hacker News
๐ŸงชProperty-Based Testing
Show HN: Open-source project that use LLM as deception system
news.ycombinator.comยท4dยท
Discuss: Hacker News
๐Ÿ›ก๏ธseL4
Call Me a Jerk: Persuading AI to Comply with Objectionable Requests
gail.wharton.upenn.eduยท3dยท
Discuss: Hacker News
โœ“Automated Theorem Proving
MorphoNAS: Embryogenic Neural Architecture Search Through Morphogen-Guided Development
arxiv.orgยท2d
๐ŸซOCaml
USB-C-ing All The Things
hackaday.comยท1dยท
Discuss: Hacker News
๐Ÿ’พRetro Computing
AI-enhanced conversational agents for personalized asthma support Factors for engagement, value and efficacy
arxiv.orgยท18h
๐ŸนEffect Systems
End-to-end Joint Punctuated and Normalized ASR with a Limited Amount of Punctuated Training Data
arxiv.orgยท1d
๐ŸซEmbedded OCaml
Comprehensive Privacy Risk Assessment in Social Networks Using User Attributes Social Graphs and Text Analysis
arxiv.orgยท1d
๐ŸŒNetworkProtocols
Socio-Technical Smell Dynamics in Code Samples: A Multivocal Review on Emergence, Evolution, and Co-Occurrence
arxiv.orgยท2d
๐Ÿ”„Reproducible Builds
Shifting IT Strategy To Balance Security and Resilience
thenewstack.ioยท6h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Proton's new privacy-first AI assistant encrypts all chats, keeps no logs
techcrunch.comยท9hยท
Discuss: Hacker News
๐ŸŽApple
Disparities in Peer Review Tone and the Role of Reviewer Anonymity
arxiv.orgยท1d
๐Ÿ”ฌStatic Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap