Show HN: Strange Attractors
blog.shashanktomar.com
S.a.r.c.a.s.m: Slightly Annoying Rubik's Cube Automatic Solving Machine
github.com
Futurelock: A subtle risk in async Rust
rfd.shared.oxide.computer
Introducing architecture variants
discourse.ubuntu.com
The Last PCB You'll Ever Buy [video]
youtube.com
Family Mart Designed Cute Teary-Eyed Stickers to Combat Food Loss
spoon-tamago.com
Use DuckDB-WASM to query TB of data in browser
lil.law.harvard.edu
My Impressions of the MacBook Pro M4
michael.stapelberg.ch
Hacking India's largest automaker: Tata Motors
eaton-works.com
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
arstechnica.com
A theoretical way to circumvent Android developer verification
enaix.github.io
Fungus: The Befunge CPU(2015)
bedroomlan.org
Perfetto: Swiss army knife for Linux client tracing
lalitm.com
Kerkship St. Jozef, Antwerp – WWII German Concrete Tanker
thecretefleet.com
How We Found 7 TiB of Memory Just Sitting Around
render.com
I Love My Wife, My Wife Is Dead
bingqiangao.com
Active listening: the Swiss Army Knife of communication
togetherlondon.com
AI scrapers request commented scripts
cryptography.dog
Show HN: Pipelex – Declarative language for repeatable AI workflows
github.com
Signs of introspection in large language models
anthropic.com
Photographing the rare brown hyena stalking a diamond mining ghost town
bbc.com
Based on this paper from the Fed's Finance and Economics Discussion Series (FEDS): https://doi.org/10.17016/FEDS.2025.064