- 304Internet Archive Switzerland (internetarchive.ch)
- 40PipeDream on the Acorn Archimedes (stonetools.ghost.io)
- 84The Intolerable Hypocrisy of Cyberlibertarianism (matduggan.com)
- 1328Google broke reCAPTCHA for de-googled Android users (reclaimthenet.org)
- 184LLMs Corrupt Your Documents When You Delegate (arxiv.org)
- 330Using Claude Code: The unreasonable effectiveness of HTML (twitter.com)
- 49Removing fsync from our local storage engine (fractalbits.com)
- 76How LEDs are made (2014) (learn.sparkfun.com)
- 508A recent experience with ChatGPT 5.5 Pro (gowers.wordpress.com)
- 6Introduction to Beaver Triples (stoffelmpc.com)
- 280Mythical Man Month (martinfowler.com)
- 123America's carpet capital: an empire and its toxic legacy (apnews.com)
- 415OpenAI’s WebRTC problem (moq.dev)
- 61Making Julia as Fast as C++ (2019) (flow.byu.edu)
- 30Building the TD4 4-Bit CPU (jayakody2000lk.blogspot.com)
- 98GrapheneOS fixes Android VPN leak Google refused to patch (cyberinsider.com)
- 778David Attenborough's 100th Birthday (bbc.com)
- 44Reviving the IBM Selectric Composer Fonts (2023) (kutilek.de)
- 141What causes lightning? The answer keeps getting more interesting (quantamagazine.org)
- 317Wi is Fi: Understanding Wi-Fi 4/5/6/6E/7/8 (802.11 n/AC/ax/be/bn) (wiisfi.com)
- 59Killswitch: Per-function short-circuit mitigation primitive (lwn.net)
- 8Show HN: Mochi.js: bun-native high-fidelity browser automation library (mochijs.com)
- 14Show HN: Free tool to mark points and polygon regions (tack.pics)
- 385AI is breaking two vulnerability cultures (jefftk.com)
- 60Read Programming as Theory Building (codeutopia.net)
- 390Cartoon Network Flash Games (webdesignmuseum.org)
- 25The context window has been shattered: Subquadratic debuts a 12M token window (thenewstack.io)
- 479An Introduction to Meshtastic (meshtastic.org)
- 194The React2Shell Story (lachlan.nz)
- 247AWS North Virginia data center outage – resolved (cnbc.com)