Backyard Coffee and Jazz in Kyoto
thedeletedscenes.substack.com
Launch HN: Reducto Studio (YC W24) – Build accurate document pipelines, fast
Rocknix is an immutable Linux distribution for handheld gaming devices
rocknix.org
uv: An extremely fast Python package and project manager, written in Rust
github.com
New Linux udisks flaw lets attackers get root on major Linux distros
bleepingcomputer.com
NASA's Voyager Found a 30k-50k Kelvin "Wall" at the Edge of Solar System
iflscience.com
Interesting Bits of Postgres Grammar
steve.dignam.xyz
Transparent Ambition: on translucent user interfaces
take.surf
How to store Go pointers from assembly
mazzo.li
Cataphract: Medieval-fantasy roleplaying wargame, in the Black-Sea C. 1300
samsorensen.blot.im
RaptorCast: Designing a Messaging Layer
category.xyz
Klein Bottle Amazon Brand Hijacking (2021)
kleinbottle.com
Using Home Assistant, adguard home and an $8 smart outlet to avoid brain rot
romanklasen.com
WhatsApp banned on House staffers' devices
axios.com
Nano-Vllm: lightweight vLLM implementation built from scratch
github.com
Show HN: Lego Island Playable in the Browser
isle.pizza
Rivulet: An esolang inspired by calligraphy && code [video]
media.ccc.de
The X Window System didn't immediately have X terminals
utcc.utoronto.ca
> it would likely be sufficient to apply a bijective (non-colliding) transformation like an avalanche hash to the stored keys to flatten everything
What are they referring to by "avalanche hash"? Trying to Google this just results in references to the avalanche effect in hash functions, which IIUC is just normal hash function stuff.