Leaking the email of any YouTube user for $10k
brutecat.com
Show HN: A no-build fullstack SSR TypeScript web framework
jsr.io
Record-breaking neutrino is most energetic ever detected
nature.com
The Prophet of Parking: A eulogy for the great Donald Shoup
worksinprogress.news
Show HN: Game Bub – open-source FPGA retro emulation handheld
eli.lipsitz.net
5G networks meet consumer needs as mobile data growth slows
spectrum.ieee.org
Smuggling arbitrary data through an emoji
paulbutler.org
PgAssistant: OSS tool to help devs understand and optimize PG performance
github.com
Show HN: yknotify – Notify when YubiKey needs touch on macOS
github.com
Automated Capability Discovery via Foundation Model Self-Exploration
arxiv.org
Are efficiency and horizontal scalability at odds?
buttondown.com
Most-Watched Software Engineering Talks of 2024
techtalksweekly.io
US and UK refuse to sign AI safety declaration at summit
arstechnica.com
Artie (YC S23) Is Hiring Business Operations
ycombinator.com
Is NixOS truly reproducible?
luj.fr
The year I didn't survive
bessstillman.substack.com
League of Legends data scraping the hard and tedious way for fun
maknee.github.io
DeaDBeeF: The Ultimate Music Player
deadbeef.sourceforge.io
Visualizing Data Is an Art – We Should Treat It Like One
perthirtysix.com
Bad Smart Watch Authentication
sprocketfox.io
Vanishing Culture: Punch Card Knitting
blog.archive.org
The missing tier for query compilers
scattered-thoughts.net
In this talk, I will introduce Syd, a GPL-3 licensed, rock-solid application kernel designed for sandboxing applications on Linux systems (version 5.19 and above). Over the past 16 years, Syd has evolved from a tool used within Exherbo Linux to detect package build mishaps into a robust security boundary for applications. The recent rewrite in Rust leverages modern Linux APIs such as seccomp-unotify(2), openat2(2), and pidfd_getfd(2) to eliminate time-of-check to time-of-use (TOCTTOU) vulnerabilities, which is essential for building a secure sandbox.