Hacker Newsnew | past | comments | ask | show | jobs | submit | perching_aix's favoriteslogin
1.Patterns for Defensive Programming in Rust (corrode.dev)
304 points by PaulHoule 1 day ago | 78 comments
2.How elites could shape mass preferences as AI reduces persuasion costs (arxiv.org)
690 points by 50kIters 2 days ago | 653 comments
3.Stacked Diffs with git rebase —onto (dineshpandiyan.com)
137 points by flexdinesh 5 days ago | 164 comments
4.Contextualization Machines (stochasm.blog)
26 points by jxmorris12 5 days ago | 3 comments
5.Why WinQuake exists and how it works (fabiensanglard.net)
152 points by wicket 2 days ago | 51 comments
6.Programming peaked (functional.computer)
215 points by Antibabelic 2 days ago | 207 comments
7.Quad9 DOH HTTP/1.1 Retirement, December 15, 2025 (quad9.net)
102 points by pickledoyster 3 days ago | 61 comments
8.Counter Galois Onion: Improved encryption for Tor circuit traffic (torproject.org)
103 points by wrayjustin 10 days ago | 31 comments
9.The Copenhagen Trap: How the West made passivity the only safe strategy (kunnas.com)
44 points by ekns 6 days ago | 35 comments
10.The CRDT Dictionary: A Field Guide to Conflict-Free Replicated Data Types (iankduncan.com)
220 points by birdculture 7 days ago | 36 comments
11.A new bridge links the math of infinity to computer science (quantamagazine.org)
255 points by digital55 10 days ago | 158 comments
12.Unpowered SSDs slowly lose data (xda-developers.com)
769 points by amichail 11 days ago | 329 comments
13.NSA and IETF, part 3: Dodging the issues at hand (cr.yp.to)
316 points by upofadown 12 days ago | 229 comments
14.Passing the Torch – My Last Root DNSSEC KSK Ceremony as Crypto Officer 4 (seastrom.com)
72 points by greyface- 12 days ago | 22 comments
15.Shaders: How to draw high fidelity graphics with just x and y coordinates (makingsoftware.com)
411 points by Garbage 13 days ago | 89 comments
16.Signal knows who you're talking to (2023) (sanesecurityguy.com)
114 points by kekqqq 13 days ago | 155 comments
17.New Proofs Probe Soap-Film Singularities (quantamagazine.org)
41 points by pseudolus 23 days ago | 3 comments
18.Towards Interplanetary QUIC Traffic (ochagavia.nl)
106 points by wofo 18 days ago | 26 comments
19.How Quake.exe got its TCP/IP stack (fabiensanglard.net)
528 points by billiob 18 days ago | 150 comments
20.Compiling Ruby to machine language (patshaughnessy.net)
287 points by todsacerdoti 18 days ago | 52 comments
21.How when AWS was down, we were not (authress.io)
203 points by mooreds 19 days ago | 74 comments
22.When did people favor composition over inheritance? (sicpers.info)
230 points by ingve 29 days ago | 209 comments
23.SSL Configuration Generator (ssl-config.mozilla.org)
269 points by smartmic 21 days ago | 80 comments
24.Spec-Driven Development: The Waterfall Strikes Back (marmelab.com)
225 points by vinhnx 21 days ago | 191 comments
25.Reproducing the AWS Outage Race Condition with a Model Checker (wyounas.github.io)
144 points by simplegeek 33 days ago | 50 comments
26.When models manipulate manifolds: The geometry of a counting task (transformer-circuits.pub)
98 points by vinhnx 38 days ago | 17 comments
27.Language models are injective and hence invertible (arxiv.org)
231 points by mazsa 37 days ago | 148 comments
28.Keeping the Internet fast and secure: introducing Merkle Tree Certificates (cloudflare.com)
215 points by tatersolid 38 days ago | 92 comments
29.Why JPEG XL ignoring bit depth is genius (and why AVIF can't pull it off) (fractionalxperience.com)
102 points by Bogdanp 40 days ago | 65 comments
30.How programs get run: ELF binaries (2015) (lwn.net)
141 points by st_goliath 41 days ago | 11 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: