Heinous Type Tom7 Project Summary:

Low-level systems stuff. Reverse engineering, security research, bit twiddling, optimisation, SIMD, uarch. 64-bit ARM enthusiast.
he/they
| Blog | https://dougallj.wordpress.com |
| http://twitter.com∕dougallj∕status∕1590357240443437057.ê.cc/twitter.html | |
| Github | https://github.com/dougallj |
| Cohost | https://cohost.org/dougall |
Heinous Type Tom7 Project Summary:

Wookash did a livestreamed follow-up interview with me a while ago and posted the video today: https://www.youtube.com/watch?v=CPCbjHILJV4
(There's a second part with Q&A forthcoming at some point.)

I thought aliasing buffers and compressed textures in order to write to them was a very bad idea, but after playing with it, it actually seems fine?
https://www.ludicon.com/castano/blog/2026/04/writing-to-compressed-textures-in-metal/
We released two tech talks today going over how to take advantage of the new architecture, features and associated developer tools.
Accelerate your machine learning workloads with the M5 and A19 GPUs
https://developer.apple.com/videos/play/tech-talks/111432/
https://www.youtube.com/watch?v=wgJX1HndGl0Boost
your graphics performance with the M5 and A19 GPUs

Xerox scanners/photocopiers randomly alter numbers in scanned documents Please see the „condensed time line“ section (the next one) for a time line of how the Xerox saga unfolded. It for example depicts that I did not push the thing to the public right away, but gave Xerox a lot of time before I did so. <iframe width="700" height="394" src="https://www.youtube.com/embed/c0O6UXrOZJo" frameborder="0" allowfullscreen></iframe>
I mean you can get fancy with them, but you can write a basic implementation in <100 lines of Python that is good enough to prove various 64-bit adder circuits logically equivalent, in a fraction of a second. It feels like cheating.
https://gist.github.com/rygorous/948308f7d998e5fd4e98344687580338