Exploring the CSS @property feature and its type-checking and animating capabilities web development Article 2473 words 6 votes
Researching the potential of using machine learning to predict random number generation security Article 6572 words 11 votes
Hacking Apple for 3 months - 55 vulnerabilities discovered, with $288,500 in bug bounties awarded security Article 9230 words 10 votes
An exploration of Project Zero Issue 2046, a seemingly unexploitable and simple bug in the V8 JavaScript engine that turns out to be exploitable in a very complex manner security Article 6983 words 7 votes
Learning Rust can be frustrating because it's different enough from other languages that you may not even be able to easily describe the issues you're having Article 5511 words 11 votes
Why general artificial intelligence will not be realized Article 8746 words, published Jun 17 2020 13 votes
Time to upgrade your monitor - Optimizing a display setup for programming Article 4239 words 14 votes
The impending doom of expiring root Certificate Authorities and legacy clients security Article 4120 words 6 votes
Making a SNES game in 2020 - The story of building Yo-Yo Shuriken, including designing and developing the game itself with modern tools and manufacturing a physical cartridge release Article 6187 words 4 votes
`zig cc`: a powerful drop-in replacement for GCC/Clang programming languages Article 5781 words 8 votes
Bytecode Alliance: Building a secure by default, composable future for WebAssembly security Article 5026 words 9 votes
Certbot usability case study: Making it easier to get HTTPS certificates security Article 6227 words 12 votes
Introducing Ristretto: A high performance, concurrent, memory-bound Go cache Article 3260 words 3 votes
The journey of building mypy and type-checking 4 million lines of Python at Dropbox Article 4423 words 6 votes
How Instagram uses static analysis like linting and automated refactoring to help manage their multi-million-line Python codebase Link 10 votes
I’m harvesting credit card numbers and passwords from your site. Here’s how. security Article 17 votes
A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World Article 7615 words, published Jan 29 2010 4 votes
Encrypted databases: The issues with searchable encryption and the ever-expanding leakage function Article 4086 words 6 votes
Data Locality - Accelerate memory access by arranging data to take advantage of CPU caching. Link 8 votes
Hard-won lessons: Five years with Node.js programming Article 3167 words, published Apr 19 2017 4 votes
Notes on structured concurrency, or: Go statement considered harmful programming languages Article 3237 words, published Apr 25 2018 11 votes