Show HN: Strange Attractors
blog.shashanktomar.com
Futurelock: A subtle risk in async Rust
rfd.shared.oxide.computer
Introducing architecture variants
discourse.ubuntu.com
A theoretical way to circumvent Android developer verification
enaix.github.io
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
arstechnica.com
Use DuckDB-WASM to query TB of data in browser
lil.law.harvard.edu
My Impressions of the MacBook Pro M4
michael.stapelberg.ch
The Last PCB You'll Ever Buy [video]
youtube.com
Hacking India's largest automaker: Tata Motors
eaton-works.com
Perfetto: Swiss army knife for Linux client tracing
lalitm.com
How We Found 7 TiB of Memory Just Sitting Around
render.com
AI scrapers request commented scripts
cryptography.dog
Show HN: Pipelex – Declarative language for repeatable AI workflows
github.com
Photographing the rare brown hyena stalking a diamond mining ghost town
bbc.com
Signs of introspection in large language models
anthropic.com
Sustainable memristors from shiitake mycelium for high-frequency bioelectronics
journals.plos.org
Pangolin (YC S25) Is Hiring a Full Stack Software Engineer (Open-Source)
docs.pangolin.net
Lording it, over: A new history of the modern British aristocracy
newcriterion.com
The 1924 New Mexico regional banking panic
nodumbideas.com
How to build silos and decrease collaboration on purpose
rubick.com
x86 architecture 1 byte opcodes
sandpile.org