TanStack npm Supply Chain Attack: What Happened and What Engineers Should Do
A coordinated compromise hit @tanstack/*, @mistralai/*, @uipath/* and more - here's the technical breakdown and defensive guidance.
1268 words
|
6 minutes
Cover Image of the Post
Why Sekiro: Shadows Die Twice Has the Best Combat System in Modern Gaming
Sekiro: Shadows Die Twice revolutionized action game combat by replacing traditional health-focused systems with a posture-based mechanic that emphasizes aggression, precision, and rhythm over dodging and stamina management.
3927 words
|
20 minutes
Cover Image of the Post
How Chess Engines Handle Opening Theory
Chess engines have a real problem in the opening phase. The position is too complex for brute-force calculation from move one, yet the opening is exactly where engines are most exposed.
2700 words
|
14 minutes
Cover Image of the Post
How a Third-Party OAuth App Bypassed Vercel's CI/CD Platform Defenses
Recent Context.ai security incident and the vulnerabilities that allowed a third-party OAuth app to access Vercel's internal systems.
967 words
|
5 minutes
Cover Image of the Post
Why We Seek Validation from Others
Why we check our phones right after posting, why we stay late to be seen, and what it would take to stop needing all of it.
3880 words
|
19 minutes
Cover Image of the Post
Security Is Not a Feature. It's a Way of Thinking.
Security is not a feature. It's a way of thinking.
2784 words
|
14 minutes
Cover Image of the Post
We Stopped Too Early: Why I'm Building a Classical Chess Engine from Scratch
Writing a classical chess engine from ground up
4099 words
|
20 minutes
Cover Image of the Post
Manage Your Own Applications Without Local Hardware
An Introduction to Cloud Self-Hosting: Part 1 of the Series
1057 words
|
5 minutes
Cover Image of the Post