Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Firewalls, Intrusion Detection, Packet Analysis, VPN
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
8848
posts in
208.8
ms
security center at university of Washington
secure-center.org
·
1h
🛡️
Security Type Systems
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
·
16h
🏗️
Systems Design
hanig/engram
: Personal knowledge graph and automation system
github.com
·
4h
🧠
Obsidian
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
1h
·
Discuss:
Hacker News
🛡️
Security Type Systems
Securing
GenAI: Vol. 8 — Deploying AI apps
securely
pub.towardsai.net
·
1d
⚡
JIT Optimizations
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
2d
🔓
Binary Exploitation
Registration
Data Access
Protocol
apnic.net
·
2h
🌍
Minimal HTTP
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
1d
🛡️
Capability VMs
A
quantitative
, multimodal wearable
bioelectronic
device for comprehensive stress assessment and sub-classification
nature.com
·
10h
·
Discuss:
Hacker News
✨
Effect Inference
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
2d
🛡️
Cybersecurity
Full-circle Test-driven
Firmware
Development with
OpenClaw
blog.adafruit.com
·
15h
·
Discuss:
Hacker News
🚂
Cranelift IR
Show HN:
Spip
– Open-Source Self-Hosted
TCP
Network Sensor
github.com
·
1d
·
Discuss:
Hacker News
⚡
QUIC Protocol
A
Horrible
Conclusion
addisoncrump.info
·
17h
·
Discuss:
Lobsters
,
Hacker News
🔓
Binary Exploitation
Agent2Agent
Threats in Safety-Critical LLM Assistants: A Human-Centric
Taxonomy
arxiv.org
·
2d
🎮
Language Ergonomics
Reddit-homelab-how-to-know-your-homelab-was-hacked.md
gist.github.com
·
5d
🛡️
Cybersecurity
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
6h
🔓
Binary Exploitation
How Meta turned the Linux Kernel into a planet-scale
Load
Balancer
. Part I
softwarefrontier.substack.com
·
14h
·
Discuss:
Substack
🛡️
Capability VMs
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
2d
·
Discuss:
Hacker News
🔓
Binary Exploitation
The Future of Systems
novlabs.ai
·
20h
·
Discuss:
Hacker News
🏗️
Systems Design
Liss
is More:
Passwords
are Dumb
caseyliss.com
·
8h
🛡️
Capability VMs
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help