1. BREAKMEIFYOUCAN! - Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies view 0 comments
  2. Playable DOOM streamed from an earbud view 0 comments
  3. Fuzzing Lua in OSS-Fuzz view 0 comments
  4. Announcing MapLibre Tile: a modern and efficient vector tile format view 6 comments
  5. Simplify Your Code: Functional Core, Imperative Shell view 13 comments
  6. KCL part 1: units view 0 comments
  7. Porting DOOM to my WebAssembly VM view 1 comments
  8. Home Lab Developments view 7 comments
  9. Hallucination Stations: On Some Basic Limitations of Transformer-Based Language Models view 2 comments
  10. The Concatenative Language XY view 0 comments
  11. AI code and software craft view 1 comments
  12. sra-archive: Very simple random access archive format view 2 comments
  13. JuiceSSH - Give me my pro features back view 10 comments
  14. I Was Right About ATProto Key Management view 115 comments
  15. A Simple fwd_diff<T> for Forward-Mode AD in C++ view 0 comments
  16. What are you doing this week? view 18 comments
  17. Kimi K2.5: Visual Agentic Intelligence view 1 comments
  18. The Intent Envelope: Proofs for Completeness, Not Just Soundness view 4 comments
  19. Implementing the transcendental functions in Ivy view 2 comments
  20. Literate Agents view 0 comments
  21. prolog-blog-engine: blog engine in pure Prolog. 0 dependencies, Markdown, server view 0 comments
  22. Reproducing a Tricky Bug in Minutes With a Custom Linux Scheduler Written in Java view 0 comments
  23. Exploring Linux on a LoongArch Mini PC view 12 comments
  24. Package JVM applications into self-contained binaries. No JVM installation required view 1 comments
  25. sysp: Systems Lisp compiling to C with homoiconic macros, refcounted memory, Hindley-Milner type inference view 14 comments
More