GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
1.
Cyber firm warns that hackers are teaming up with crime rings to hijack cargo — phishing emails and social engineering deployed to steal physical shipments
(tomshardware.com)
2025-11-03 | by Luke James |
related products
| tags:
hackers
,
organised
,
proofpoint
2.
Your AI Agent Is Now a Target for Email Phishing
(spectrum.ieee.org)
2025-11-03 | by Drew Robb |
related products
| tags:
agents
,
ai agents
,
email
3.
Nation-state hackers deliver malware from “bulletproof” blockchains
(arstechnica.com)
2025-10-31 |
related products
| tags:
bulletproof
,
etherhiding
,
google
4.
Three ways formally verified code can go wrong in practice
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
code
,
correct
,
int
5.
ScribeOCR – Web interface for recognizing text, OCR, & creating digitized docs
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
ocr
,
proofreading
,
scribe
6.
Creating a database of motivated proofs
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
motivated
,
platform
,
proof
7.
C-sigma: Easy-to-use Sigma proofs in C using libsodium
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
32
,
const
,
proof
8.
We all dodged a bullet
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
anubis
,
jshelter
,
proof
9.
We All Dodged a Bullet
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
anubis
,
jshelter
,
proof
10.
Anything can be a message queue if you use it wrongly enough (2023)
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
anubis
,
jshelter
,
proof
11.
'Ten Martini' Proof Uses Number Theory to Explain Quantum Fractals
(news.ycombinator.com)
2025-10-31 | by Lyndie Chiou |
related products
| tags:
avila
,
butterfly
,
jitomirskaya
12.
Who does your assistant serve?
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
anubis
,
jshelter
,
proof
13.
Ongoing Lean formalisation of the proof of Fermat's Last Theorem
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
fermat
,
information
,
project
14.
Age Verification Doesn't Need to Be a Privacy Footgun
(news.ycombinator.com)
2025-10-31 | by View Archive |
related products
| tags:
adult
,
knowledge
,
privacy
15.
The math is haunted
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
goal
,
lean
,
proof
16.
The Math Is Haunted
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
goal
,
lean
,
proof
17.
Evaluating publicly available LLMs on IMO 2025
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
best
,
model
,
models
18.
Verified dynamic programming with Σ-types in Lean
(news.ycombinator.com)
2025-10-31 | by Tanner Duve |
related products
| tags:
let
,
maxdollars_spec
,
memo
19.
Verified Dynamic Programming with Σ-types in Lean
(news.ycombinator.com)
2025-10-31 | by Tanner Duve |
related products
| tags:
let
,
maxdollars_spec
,
memo
20.
Proofs Without Words
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
arrangement
,
following
,
proof
21.
Writing a Truth Oracle in Lisp
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
function
,
proof
,
right
22.
Peano arithmetic is enough, because Peano arithmetic encodes computation
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
binary
,
induction
,
list
23.
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
accounts
,
proofpoint
,
researchers
Today's top topics:
apple
amazon
google
million
black
deals
android
game
black friday
billion
View all today's topics →