Kunerth's Algorithm for Modular Square Roots: A Forgotten Method

Adolf Kunerth’s algorithm for computing modular square roots and solving general quadratic Diophantine equations represent conceptually distinct approaches from modern methods like Tonelli-Shanks, transforming discrete modular arithmetic problems into Diophantine equations seeking integer points on parabolic curves; despite Wikipedia’s 2024 deletion citing non-notability and incomprehensibility based solely on the Dickson’s summary, the algorithms merit preservation as the only known methods avoiding direct factorization through coefficient based descent rather than group theoretic properties.

Read More

The Cost of Abliteration in Large Language Models

This article examines two potential costs of the abliteration process for Large Language Models: performance penalties and output quality degradation. For comparison, I evaluated the rising stars of local LLM models in autumn 2025: Qwen3-VL variants, alongside cloud based solutions from Claude and Gemini.

Read More

EU Chat Control Regulation: Constitutional Conflicts and Bureaucratic Impasse

The proposed EU Chat Control regulation exemplifies institutional tensions between supranational regulatory ambitions and member state constitutional frameworks; Denmark’s ministerial level advocacy for permanent mass message scanning confronts German constitutional barriers, the European Court of Human Rights precedent establishing encryption as a fundamental right, and the European Parliament’s prior rejection, creating conditions for a substantial institutional crisis should the regulation advance toward implementation.

Read More

Forward an IP address between OpenBSD via WireGuard

This brief article provides a footnote on the configuration of an OpenBSD machine with two IPv4 addresses: 1.2.3.4/24 and 1.2.4.5/24. In this configuration, 1.2.3.4/24 is utilized as the machine’s address and a point for the tunnel, and 1.2.4.5/24 is forwarded to the remote machine within a dedicated routing domain. Furthermore, the machine in question has an IPv6 network aaaa:bbbb:cccc::/128. One address, aaaa:bbbb:cccc::eeee:ffff/64, is utilized inside the tunnel, while aaaa:bbbb:cccc::1/64 is used on the machine.

Read More

Integrating Remote email2rss into macOS

This article provides a guide for creating an AppleScript that registers as the default handler for the feed URI scheme on a local machine. The script forwards all URIs to a remote instance and registers it into rss2email. It also contains some useful notes about running rss2email on remote host.

Read More

Quantum Computing: Engineering Constraints and Physical Limitations

Quantum computing research accelerated following Shor’s 1994 factorization algorithm invention, which promised polynomial time integer factorization capable of breaking RSA, and subsequently elliptic curve cryptography; however, three decades of development reveal fundamental engineering obstacles, qubit noise, decoherence timescales measured in nanoseconds, and threshold theorem redundancy requirements of $10^4$ to $10^6$ physical qubits per logical qubit, that render practical cryptographic attacks implausible with current or foreseeable future technology.

Read More

Enforcing DNS-over-TLS on Local DNS Resolver with Random Upstream

This article provides a guide for installing a local DNS resolver that enforces DNS-over-TLS to a randomly selected publicly available upstream server. The setup described respects DNS response consistency by enforcing DNSSEC if it is supported by the DNS zone, encrypts DNS traffic, and uses DNS servers from different providers. The second section of this article addresses the question of privacy.

Read More

Low Latency Atomic Operations for JVM

This article presents an implementation of atomic operations optimized for low latency in multithreaded JVM environments. The implementation achieves approximately 2x lower latency under high concurrency through adaptive backoff mechanisms in compare and swap loops.

Read More