Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
yossarian
.
15
A most vexing parse, but for Python packaging
programming
python
blog.yossarian.net
authored by
yossarian
11 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
60
Things I hate about Rust, redux
rant
rust
blog.yossarian.net
authored by
yossarian
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
6
pip-audit: a tool for identifying Python packages with known vulnerabilities
python
security
pypi.org
via
yossarian
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
LLVM internals, part 4: attributes and attribute groups
compilers
rust
blog.yossarian.net
authored by
yossarian
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
A small DOCUMERICA Twitter bot
art
python
blog.yossarian.net
authored by
yossarian
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
9
LLVM internals, part 3: from bitcode to IR
compilers
rust
blog.yossarian.net
authored by
yossarian
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
LLVM internals, part 2: parsing the bitstream
compilers
rust
blog.yossarian.net
authored by
yossarian
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
26
LLVM internals, part 1: the bitcode format
compilers
blog.yossarian.net
authored by
yossarian
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
75
totally_safe_transmute, line-by-line
compilers
rust
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
16 comments
16
86
Weird architectures weren't supported to begin with
culture
programming
rant
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
29 comments
29
30
Static calls in Linux 5.10
assembly
c
linux
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Reverie: An optimized zero-knowledge proof system
cryptography
rust
blog.trailofbits.com
via
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
30
How many registers does an x86-64 CPU have?
assembly
reversing
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
9
Towards an automated changelog workflow
practices
programming
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
22
Understanding static single assignment forms
assembly
c
compilers
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
26
What they don't tell you about demand paging in school
linux
osdev
offlinemark.com
via
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
17
LLVM's getelementptr, by example
assembly
c
compilers
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
20
Hiding messages in x86 binaries using semantic duals
assembly
rust
security
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
26
Writing and publishing a Python module in Rust
python
rust
blog.yossarian.net
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
8
Verifying Windows binaries, without Windows
cryptography
reversing
security
windows
blog.trailofbits.com
authored by
yossarian
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Locating a compiler bug with git bisection
compilers
vcs
blog.yossarian.net
authored by
yossarian
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
15
Implementing the Clipper chip cipher in Rust
cryptography
rust
blog.yossarian.net
authored by
yossarian
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
Finding treacherous encoding permutations with baseperm
programming
security
blog.yossarian.net
authored by
yossarian
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
40
Anybody can write good bash (with a little effort)
programming
blog.yossarian.net
authored by
yossarian
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
30 comments
30