« BackPoking holes into bytecode with peephole optimisationsxnacly.meSubmitted by xnacly 4 days ago