Plundervolt, by Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. “We were able to corrupt the integrity of Intel SGX on Intel Core processors by controling the voltage when executing enclave computations. This means that even Intel SGX’s memory encryption/authentication technology cannot protect against Plundervolt.”
Deep-Learning the Hardest Go Problem in the World, tackling Igo Hatsuyōron 120.
Dependently Typed Haskell in Industry (PDF), Experience Report by David Thrane Christiansen, Iavor S. Diatchki, Robert Dockins, Joe Hendrix, and Tristan Ravitch.
A formal proof of the independence of the continuum hypothesis, by Jesse Michael Han and Floris van Doorn.
Introducing Glush: a robust, human readable, top-down parser compiler, by Magnus Holm.
Xinu is a small, elegant operating system that supports dynamic process creation, dynamic memory allocation, network communication, local and remote file systems, a shell, and device-independent I/O functions.
CI/CD Pipelines: Monad, Arrow or Dart?
VimLog, a condensed ChangeLog for Vim.
Links of the decade, beware: flashing logo.