Deep Learning Is Not So Mysterious or Different
arxiv.org
Hidden Messages in Emojis and Hacking the US Treasury
slamdunksoftware.substack.com
Launching RDAP; sunsetting WHOIS
icann.org
Show HN: Localscope–Limit scope of Python functions for reproducible execution
localscope.readthedocs.io
Extracting content from an LCP "protected" ePub
shkspr.mobi
Show HN: Psychedelic animation generator; (p)art of your next trip
collidingscopes.github.io
Coq-of-rust: Formal verification tool for Rust
github.com
The exceptional Jordan algebra (2020)
cp4space.hatsya.com
Chaos in the Cloudflare Lisbon Office
blog.cloudflare.com
Piramidal (YC W24) is hiring a ML Engineer to decode brainwaves
ycombinator.com
Show HN: EnkiTask: Lightweight Project Management for Freelancers
enkitask.com
Recommendations for designing magic numbers of binary file formats
hackers.town
Underware 2.0 – Open Source Infinite Cable Management
makerworld.com
Copyright and the Demo Scene
datagubbe.se
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table
wired.com
Going down the rabbit hole of Git's new bundle-URI
blog.gitbutler.com
Conducting forensics of mobile devices to find signs of a potential compromise
github.com
Compression of Spectral Images Using Spectral JPEG XL
jcgt.org
Genomic study: our capacity for language emerged at least 135k years ago
phys.org
When the Dotcom Bubble Burst
dfarq.homeip.net
Image Processing in C – Dwayne Phillips [pdf]
homepages.inf.ed.ac.uk
Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours
tomshardware.com