Hi everyone, my name is P Swyom Sanjog. Welcome back to my blog—I hope you’re all doing well. Today, I’m bringing a new topic: Virtual DOM. Let’s understand what the Virtual DOM is in simple terms. We’ll cover key questions like what it is, why it’s used, and how it works. So, let’s get started! Virtual Dom So, let’s break down the topic into “Virtual” and “DOM.” Virtual means something that exi
Your phone will connect to the strongest tower it hears. It does not ask for ID first. It assumes trust, and that assumption is the entire problem. I first noticed this in 2019 outside a security conference in Las Vegas. My test Android dropped from LTE to 2G for 47 seconds, then returned to normal. No user notification. The baseband logs showed a cipher downgrade to A5/0, a location area code tha
Hello everyone! We are two 13-year-old students from Russia, and we want to show QwenSeek-2B! For us, this is a big result! We released the model on Hugging Face, and the 1000+ downloads! We are just incredibly Training Details: https://huggingface.co/datasets/Jackrong/DeepSeek-V4-Distill-8000x We will continue to release new models, even cooler! And maybe in the near scratch! But for now, we are
I have been working on a .NET assertion library called Axiom Assertions. It started as a way to learn how assertion libraries work, then grew into an experiment around deterministic output, batching, analyzers, and AI-focused test assertions. The repo is here: https://github.com/spearzy/Axiom-Assertions This did not start as a plan to overthrow every assertion library in .NET. That would be a bit
The Problem: We Were Flying Blind At Refer, we're on a mission to enable talented individuals to fulfill their professional potential by helping them pursue their ideal job. Behind the scenes, that means a lot of microservices, and recently we decided to consolidate everything into a mono-repository. If you've ever migrated dozens of microservices into a monorepo, you know the drill: contracts b
This technical post walks through the design and implementation of Secure Playground: a local web app that simulates prompt-injection attacks against large language models and demonstrates simple defenses. Provide a minimal, reproducible environment to test payloads and defensive strategies. Make it easy to add new providers and run mutation-based red-team experiments. Offer a leaderboard and scor
The pattern in AI coding tools has been bugging me for a while. You sign up for one of them. You agree to a per-seat subscription. You get exactly one model: the one the vendor picked for you. Underneath, the whole thing is glued to that vendor’s SDK, so even if you wanted to swap models, you couldn’t without forking. Then the next month, a better model ships from a different vendor, and you’re st
I built a React form library 2 years ago. It got almost zero usage. Recently, I revisited the idea and realized the problem wasn’t the code — it was the approach. Most form libraries are powerful, but they come with complexity: too much setup too much wiring too much abstraction So I rebuilt it from scratch with one goal: Make forms stupidly simple. Every time I build a form in React, I repeat the