Conducting forensics of mobile devices to find signs of a potential compromise
github.com
Docs – Open source alternative to Notion or Outline
github.com
The Alexa feature "Do Not Send Voice Recordings" you enabled no longer available
discuss.systems
Going down the rabbit hole of Git's new bundle-URI
blog.gitbutler.com
Artificial photosynthesis directed toward organic synthesis
nature.com
Image Processing in C – Dwayne Phillips [pdf]
homepages.inf.ed.ac.uk
Amiga 600: From the Amiga No One Wanted to Retro Favorite
dfarq.homeip.net
That Time I Recreated Photoshop in C++
f055.net
When the Dotcom Bubble Burst
dfarq.homeip.net
Show HN: 10 teams are racing to build a pivotal tracker replacement
bye-tracker.net
Did the Particle Go Through the Two Slits, or Did the Wave Function?
profmattstrassler.com
Local-First and Ejectable
thymer.com
A Guide to Undefined Behavior in C and C++ (2010)
blog.regehr.org
Everything Picolisp can do, and more
picolisp.com
Who Is Free Software For?
tante.cc
From Languages to Language Sets
gist.github.com
A 62M-year-old skeleton sheds light on an enigmatic mammal
sciencedaily.com
Tänzer: The lovable web server framework for Tcl
tanzer.io
Kastle (YC S24) Is Hiring Engineer #3
ycombinator.com
It is interesting that there are analogies between encryption (or hashes) and Collatz conjecture.