Garfield's Proof of the Pythagorean Theorem
(news.ycombinator.com)
61.
62.
63.
64.
Russian bulletproof hosting provider sanctioned over ransomware ties
(bleepingcomputer.com)
65.
Valve is about to win the console generation
(news.ycombinator.com)
66.
67.
Your AI Agent Is Now a Target for Email Phishing
(spectrum.ieee.org)
68.
Nation-state hackers deliver malware from “bulletproof” blockchains
(arstechnica.com)
69.
Three ways formally verified code can go wrong in practice
(news.ycombinator.com)
70.
ScribeOCR – Web interface for recognizing text, OCR, & creating digitized docs
(news.ycombinator.com)
71.
Creating a database of motivated proofs
(news.ycombinator.com)
72.
C-sigma: Easy-to-use Sigma proofs in C using libsodium
(news.ycombinator.com)
73.
We all dodged a bullet
(news.ycombinator.com)
74.
We All Dodged a Bullet
(news.ycombinator.com)
75.
Anything can be a message queue if you use it wrongly enough (2023)
(news.ycombinator.com)
76.
'Ten Martini' Proof Uses Number Theory to Explain Quantum Fractals
(news.ycombinator.com)
77.
Who does your assistant serve?
(news.ycombinator.com)
78.
Ongoing Lean formalisation of the proof of Fermat's Last Theorem
(news.ycombinator.com)
79.
Age Verification Doesn't Need to Be a Privacy Footgun
(news.ycombinator.com)
80.
The math is haunted
(news.ycombinator.com)
81.
The Math Is Haunted
(news.ycombinator.com)
82.
Evaluating publicly available LLMs on IMO 2025
(news.ycombinator.com)
83.
Verified dynamic programming with Σ-types in Lean
(news.ycombinator.com)
84.
Verified Dynamic Programming with Σ-types in Lean
(news.ycombinator.com)
85.
Proofs Without Words
(news.ycombinator.com)
86.
Writing a Truth Oracle in Lisp
(news.ycombinator.com)
87.
Peano arithmetic is enough, because Peano arithmetic encodes computation
(news.ycombinator.com)
88.
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
(bleepingcomputer.com)