🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Secure Communication, Encryption Algorithms, Zero-knowledge Proofs, Blockchain
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Self-Signed JWTs
selfref.com
·
14h
·
Discuss:
Hacker News
🌐
HTMX
How to Secure a Linux Server
github.com
·
21h
·
Discuss:
Hacker News
🔍
eBPF
Your Signal, Their Data: Privacy Analysis of Wireless-Scanning SDKs in Android
dspace.networks.imdea.org
·
3d
·
Discuss:
Hacker News
👁️
Observability
Enough of the billionaires and their big tech. ‘Frugal tech’ will build us all a better world | Eleanor Drage
theguardian.com
·
3h
·
Discuss:
Hacker News
⚙️
Engineering
Expose and Circumvent SNI-Based QUIC Censorship of the Great Firewall of China
gfw.report
·
11h
·
Discuss:
Hacker News
🕸️
Service Mesh
Do Video-Game Characters Matter Morally?
reducing-suffering.org
·
13h
·
Discuss:
Hacker News
⚙️
Engineering
Introduction to Unikernel: Building, Deploying Lightweight, Secure Applications
tallysolutions.com
·
18h
·
Discuss:
Hacker News
📦
WebAssembly
Speak, Don't Type
typeless.com
·
5h
·
Discuss:
Hacker News
🌐
HTMX
Quadratic Voting
radicalxchange.org
·
22h
·
Discuss:
Hacker News
📡
Distributed Systems
System Design Interviewing Tips (2022)
yusufaytas.com
·
16h
·
Discuss:
Hacker News
🚢
DevOps
Deriving Rope the Proper Way
nor-blog.pages.dev
·
1d
·
Discuss:
Hacker News
🔄
Compiler Design
What happens when line between authentic and artificial is impossible to draw?
syntheticauth.ai
·
1d
·
Discuss:
Hacker News
✅
Formal Verification
Cheating on Quantum Computing Benchmarks
schneier.com
·
1d
·
Discuss:
Hacker News
⚡
Performance Engineering
Deepfakes and the War on Trust
thecipherbrief.com
·
16h
·
Discuss:
Hacker News
🕸️
Service Mesh
BitVMX New Open Source Components: Key Management, Storage, and Configuration
bitvmx.org
·
2d
·
Discuss:
Hacker News
📦
WebAssembly
Authenticating GitHub Actions without API keys
oblique.security
·
1d
·
Discuss:
r/programming
🕸️
Service Mesh
Strong Goldbach in 2nd-order logic under standard semantics, semantically closed
medium.com
·
3d
·
Discuss:
Hacker News
✅
Formal Verification
GenosDB: Distributed Graph-Based Database
genosdb.com
·
12h
·
Discuss:
Hacker News
🗄
Database Systems
Exploiting vulnerabilities in the Blink video doorbell
jacksondonaldson.com
·
21h
·
Discuss:
Hacker News
🔍
eBPF
RIP Amazon QLDB
news.alvaroduran.com
·
1d
·
Discuss:
Hacker News
🗄
Database Systems
Loading...
Loading more...
« Page 1
•
Page 3 »