Miyawaki微砍伐方法(❄️得分:3天内150多个)
https://readhacker.news/s/6xeMY
https://readhacker.news/s/6xeMY
Future Ecologies Podcast
FE6.5 - The Method — Future Ecologies Podcast
The Miyawaki Method of micro-forestry is a viral sensation: sprouting tiny, dense, native tree cover in neighbourhoods all around the world. With the promise of afforestation at a revolutionary speed, this planting technique has become the darling of green…
我的第一个经过验证的命令计划(16小时内得分:150多个)
https://readhacker.news/s/6xmPC
https://readhacker.news/s/6xmPC
Markus Himmel
My first verified (imperative) program
One of the many exciting new features in the upcoming Lean 4.22 release is a preview of the new verification infrastructure for proving properties of imperative programs. In this post, I’ll take a first look at this feature, show a simple example of what…
Show HN:Offchess - 100K+离线,无广告国际象棋拼图应用程序(4小时内得分:153+)
https://readhacker.news/s/6xpws
https://readhacker.news/s/6xpws
Offchess
OffChess - Offline Chess Puzzles App
Play 100,000+ offline Chess puzzles for free.
Microchip没有(正式)告诉您有关VSC8512的信息(❄️分数:3天内150多个)
https://readhacker.news/s/6xe6g
https://readhacker.news/s/6xe6g
Google现在可以阅读您的WhatsApp消息(🔥分数:1小时内158+)
https://readhacker.news/s/6xqvv
https://readhacker.news/s/6xqvv
Neowin
Google can now read your WhatsApp messages, here's how to stop it
Google has released a feature that allows Gemini to access third-party apps, such as WhatsApp, even if you've turned off Gemini Apps Activity. Here's how to prevent that from happening.
直到您可以使用github readme.md文件的SVG制作“ gif”(9小时内得分:151+)lin ...
https://readhacker.news/s/6xptx
https://readhacker.news/s/6xptx
koaning.io
SVGs that feel like GIFs
The moving image below is only 49Kb and has an incredibly high resolution. It's similar to a GIF but instead of showing moving images, it shows moving SVGs!
supabase MCP泄漏了您的整个SQL数据库,一次致命的三杆攻击(🔥得分:1小时162+)lin ...
https://readhacker.news/s/6xqNg
https://readhacker.news/s/6xqNg
Simon Willison’s Weblog
Supabase MCP can leak your entire SQL database
Here's yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data back …