Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
encryption, ciphers, cryptanalysis, PKI, hash functions
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187352
posts in
26.5
ms
PEAKS No 42: The Open-Weight Uprising: GPT-5.5, Qwen Beats a
397B
Giant, and Your
Jira
Data Is Now AI Training Fuel
🟠
Hacker News
bogdandeac.com
·
2d
A
glimpse
into
cyber-security
’s AI-driven future
🔐
Cybersecurity
economist.com
·
1d
·
Hacker News
GnuPG
introduces support for post-quantum crypto
encryption
& 64-bit Windows improvements
🔒
Digital Privacy
alternativeto.net
·
3d
Secure
signatures
without a private key
🔐
Encryption
katexochen.aro.bz
·
1d
·
Lobsters
,
Hacker News
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
🔌
Hardware Security
singularityhub.com
·
3d
Quantum
Computers
Are Not A Threat To 128-bit
Symmetric
Keys
🕹️
Hardware Emulation
lemmy.world
·
4d
SSH vs
SSL/TLS
— Lessons I Learned While Studying Cybersecurity and Solving Labs
🔐
Encryption
infosecwriteups.com
·
4d
Show HN: Quantum Temporal
Cryptography
– spec for
interplanetary
trust chains
⏱️
Network Time Protocol
zenodo.org
·
5d
·
Hacker News
DslsDZC/HIC
: HIC: A hierarchical isolation kernel reference architecture. Unifying security, performance, and
modularity
in a single design, enabling deployment from embedded to cloud with full lifecycle evolution.
🐧
Linux
github.com
·
2d
·
Hacker News
What is a
passkey
, how does it work and why is it better than a
password
?
🔐
Cybersecurity
theguardian.com
·
6d
·
Hacker News
krb5
_
allow
_weak_crypto (3) Linux Manual Page
👻
Spectre
systutorials.com
·
6d
The FBI Says
Warrant-Proof
Encryption
Is A Public Safety Problem - Here's What It Means
🔐
Encryption
slashgear.com
·
3d
Catching
the Fly: Practical Challenges in Making Blockchain
FlyClient
Real
🔗
Tailscale
arxiv.org
·
23h
Digital Shield:
Re-architecting
the
Hardcore
Security Paradigm in the Battle for Web3 Asset…
🔐
Cybersecurity
medium.com
·
6d
The Accidental
Ancestor
— How a Computer for
Verifying
Numbers Shaped Modern Hashing
🕹️
Hardware Emulation
0xkrt26.github.io
·
3d
·
Hacker News
GitHub
Dorking
: The Complete 2026 Hunter’s Guide to Finding
Exposed
Secrets
🌿
Git
medium.com
·
6d
IPv7
: Identity-Centric Network Protocol for Security, Proxy Mitigation, and
Operability
🌐
DNS over QUIC
datatracker.ietf.org
·
5d
·
Hacker News
Software
🐃
Free Software
news.ycombinator.com
·
3d
·
Hacker News
VLAN
Segmentation:
Securing
IoT Devices from the Main Network
🛡️
Network Security
valtersit.com
·
6d
·
DEV
Hacking
Policy for the Public Good
🔓
Hacking
youtube.com
·
6d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help