If Your Adversary Is the Mossad (2014) [pdf]
usenix.org
How I turned Zig into my favorite language to write network programs in
lalinsky.com
An overengineered solution to `sort | uniq -c` with 25x throughput (hist)
github.com
Why I'm teaching kids to hack computers
hacktivate.app
Show HN: Write Go code in JavaScript files
npmjs.com
Show HN: MyraOS – My 32-bit operating system in C and ASM (Hack Club project)
github.com
Sandhill cranes have adopted a Canada gosling
smithsonianmag.com
You already have a Git server
maurycyz.com
Ken Thompson recalls Unix's rowdy, lock-picking origins
thenewstack.io
Are-we-fast-yet implementations in Oberon, C++, C, Pascal, Micron and Luon
github.com
Structure and Interpretation of Classical Mechanics
tgvaughan.github.io
Sphere Computer – The Innovative 1970s Computer Company Everyone Forgot
sphere.computer
We Saved $500k per Year by Rolling Our Own "S3"
engineering.nanit.com
A bug that taught me more about PyTorch than years of using it
elanapearl.github.io
Tamper-Sensing Meshes Using Low-Cost, Embedded Time-Domain Reflectometry
jaseg.de
NORAD’s Cheyenne Mountain Combat Center, c.1966
flashbak.com
A Looking Glass Half Empty, Part 2: A Series of Unfortunate Events
filfre.net
Asbestosis
diamondgeezer.blogspot.com
Gleescript – Bundle Gleam-on-Erlang project into an executable file
github.com
Poison, Poison Everywhere
loeber.substack.com
Researchers demonstrate centimetre-level positioning using smartwatches
otago.ac.nz
Interesting project but I wonder if this is mostly academic. Wheatstone bridges are very sensitive to tampering. While the reflectometry is pretty cool I wonder if for practical purposes the extra sensitivity is needed for physical intrusion detection. While 10€ may not be much for securing a payment terminal a wheatstone bridge is a lot cheaper.