- 52IPv6 is not insecure because it lacks a NAT (johnmaguire.me)
- 95Iterative image reconstruction using random cubic bézier strokes (tangled.org)
- 138Bypassing Gemma and Qwen safety with raw strings (teendifferent.substack.com)
- 4Ask HN: How would you design for this scale today? ()
ask - 41Face as a QR Code (bookofjoe2.blogspot.com)
- 85Use Social Media Mindfully (danielleheberling.xyz)
- 87Selling SaaS in Japan (embedworkflow.com)
- 135Nepal's Mountainside Teahouses Elevate the Experience for Trekkers (smithsonianmag.com)
- 19The Old World Order Is Dead (musgrave.substack.com)
- 3Ask HN: Would you trust a new browser security extension in 2025? ()
ask - 320Nearly a third of social media research has undisclosed ties to industry (science.org)
- 683Dead Internet Theory (kudmitry.com)
- 761Gaussian Splatting – A$AP Rocky "Helicopter" music video (radiancefields.com)
- 88Graphics In Flatland – 2D ray tracing [video] (youtube.com)
- 87MTOTP: Wouldn't it be nice if you were the 2FA device? (github.com)
- 155Fix your robots.txt or your site disappears from Google (alanwsmith.com)
- 39Weight Transfer for RL Post-Training in under 2 seconds (research.perplexity.ai)
- 55String theory can now describe a universe that has dark energy? (quantamagazine.org)
- 617A decentralized peer-to-peer messaging application that operates over Bluetooth (bitchat.free)
- 44How Hightouch built their long-running agent harness (amplifypartners.com)
- 366GLM-4.7-Flash (huggingface.co)
- 34Legal Structures for Latin American Startups (2021) (latamlist.com)
- 63Self Sanitizing Door Handle (jamesdysonaward.org)
- 30Show HN: E80: an 8-bit CPU in structural VHDL (github.com)
- 161Threads edges out X in daily mobile users, new data shows (techcrunch.com)
- 7Bessent tells banks deregulation makes up for 10% rate cap (americanbanker.com)
- 51Understanding C++ Ownership System (blog.aiono.dev)
- 3TruCite–an independent verification layer for AI outputs in regulated workflows ()
- 185Sins of the Children (asteriskmag.com)
- 157Simple Sabotage Field Manual (1944) [pdf] (cia.gov)