Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

How LLMs Distort Our Written Language

Google Cloud fraud defense, the next evolution of reCAPTCHA

I built a DevTools extension that converts any network request to fetch, Axios, TypeScript, React Query — one click

The eighth-generation TPU: An architecture deep dive

Gmail: Bringing easy end-to-end encryption to all businesses

IPv6 traffic crosses the 50% mark

Parry Parries Again: Reanimating the Famous Paranoid Chatbot (In a Day)

Spanner Omni, a downloadable version of Google Spanner

A new spam policy for “back button hijacking”

vLLM-compile: Bringing Compiler Optimizations to LLM Inference

Anonymous survey — State of Developer Burnout 2026 (3 min, results published publicly)

Now you can see the company tags on leetcode for free

Company seeking Transformed / Product Operating Model

Building an agentic escrow for software projects.

I built JiukBlocker v0.8: A Manifest V3 extension to block Short Videos, Ads, and NSFW content with zero-latency. (Open Source)

A Forex Signals App Focused on Clarity, Risk Awareness, and Skill Development

I have AI "Universal Brain" "Jetnote", I need your brutal feedback on the Multi-AI switching.

Game Creation: Star catcher 1 Secret HAck included Announcing SOON!

Game Creation and Development FUN Economy

Echo Shift: A Unique Puzzle Game

[Closed Test] ProjectHub - A simple way to track bugs and ideas for your projects.

How Colossus optimizes data placement for performance

Blog: Mitigating URL-based Exfiltration in Gemini

DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Hackers

Show HN: Codala, a social network built on scanning barcodes

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

How Mossad hacked traffic cameras to track Ayatollah Khamenei

Anti-stringing device for a coin acceptor (1996)

Designing AI Chip Software and Hardware

More →