The Internet Is Rotting - The glue that holds humanity’s knowledge together is coming undone Article 6493 words 9 votes
An exploration of the types of subclassing and when inheritance is a good choice compared to composition, through the lens of Python Article 4656 words 4 votes
Attempting to use a software engineering approach to win at chess against my brother—and only my brother Article 3116 words, published May 28 2021 10 votes
Exploring the CSS @property feature and its type-checking and animating capabilities web development Article 2473 words 6 votes
Researching the potential of using machine learning to predict random number generation security Article 6572 words 11 votes
Hacking Apple for 3 months - 55 vulnerabilities discovered, with $288,500 in bug bounties awarded security Article 9230 words 10 votes
An exploration of Project Zero Issue 2046, a seemingly unexploitable and simple bug in the V8 JavaScript engine that turns out to be exploitable in a very complex manner security Article 6983 words 7 votes
Learning Rust can be frustrating because it's different enough from other languages that you may not even be able to easily describe the issues you're having Article 5511 words 11 votes
Why general artificial intelligence will not be realized Article 8746 words, published Jun 17 2020 13 votes
Time to upgrade your monitor - Optimizing a display setup for programming Article 4239 words 14 votes
Making a SNES game in 2020 - The story of building Yo-Yo Shuriken, including designing and developing the game itself with modern tools and manufacturing a physical cartridge release Article 6187 words 4 votes
Certbot usability case study: Making it easier to get HTTPS certificates security Article 6227 words 12 votes
Introducing Ristretto: A high performance, concurrent, memory-bound Go cache Article 3260 words 3 votes
The journey of building mypy and type-checking 4 million lines of Python at Dropbox Article 4423 words 6 votes
How Instagram uses static analysis like linting and automated refactoring to help manage their multi-million-line Python codebase Link 10 votes
I’m harvesting credit card numbers and passwords from your site. Here’s how. security Article 17 votes
A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World Article 7615 words, published Jan 29 2010 4 votes
Encrypted databases: The issues with searchable encryption and the ever-expanding leakage function Article 4086 words 6 votes
Data Locality - Accelerate memory access by arranging data to take advantage of CPU caching. Link 8 votes