Show HN: Strange Attractors
blog.shashanktomar.com
Futurelock: A subtle risk in async Rust
rfd.shared.oxide.computer
Introducing architecture variants
discourse.ubuntu.com
A theoretical way to circumvent Android developer verification
enaix.github.io
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
arstechnica.com
Use DuckDB-WASM to query TB of data in browser
lil.law.harvard.edu
My Impressions of the MacBook Pro M4
michael.stapelberg.ch
Hacking India's largest automaker: Tata Motors
eaton-works.com
Perfetto: Swiss army knife for Linux client tracing
lalitm.com
The Last PCB You'll Ever Buy [video]
youtube.com
How We Found 7 TiB of Memory Just Sitting Around
render.com
AI scrapers request commented scripts
cryptography.dog
Show HN: Pipelex – Declarative language for repeatable AI workflows
github.com
Sustainable memristors from shiitake mycelium for high-frequency bioelectronics
journals.plos.org
Pangolin (YC S25) Is Hiring a Full Stack Software Engineer (Open-Source)
docs.pangolin.net
Signs of introspection in large language models
anthropic.com
The 1924 New Mexico regional banking panic
nodumbideas.com
Lording it, over: A new history of the modern British aristocracy
newcriterion.com
How to build silos and decrease collaboration on purpose
rubick.com
Attention lapses due to sleep deprivation due to flushing fluid from brain
news.mit.edu
x86 architecture 1 byte opcodes
sandpile.org
Already discussed less than a day ago: https://news.ycombinator.com/item?id=42803559