Feeds to Scour
SubscribedAll
Scoured 256130 posts in 5.47 s
Securing Legacy Android Apps: Modern Encryption Practices
thenewstack.ioยท1d
๐Ÿ”—Hash Functions
Preview
Report Post
Performance Hints for BigQuery
trmlabs.comยท8hยท
Discuss: Hacker News
๐Ÿ“ˆQuery Optimization
Preview
Report Post
<p>**Abstract:** This paper proposes a novel framework for Federated Quantum Key Distribution (FQKD) integrating adaptive trust management mechanisms to enhance...
freederia.comยท2h
๐Ÿ”—Hash Functions
Preview
Report Post
robertsdotpm/namebump: Namebump is a registrationless, key-authenticated name registry where writes bump prior values.
github.comยท5hยท
Discuss: Hacker News
๐Ÿ—๏ธHash Tables
Preview
Report Post
Titan Quest/Characters
allthetropes.orgยท3h
๐Ÿ”—Hash Functions
Preview
Report Post
Introducing the XLab AI Security Guide
lesswrong.comยท11h
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Symmetric vs. Asymmetric Cryptography (What Actually Matters)
blog.ellipticc.comยท1d
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge
dev.toยท12hยท
Discuss: DEV
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
[Discussion] The "Noise" Bottleneck in Local 8B RAG โ€“ A comparison of cleaning strategies (Regex vs. Unstructured vs. Entropy)
reddit.comยท9hยท
Discuss: r/LocalLLaMA
๐ŸงชParser Testing
Preview
Report Post
What I Learned Building a Storage Engine That Outperforms RocksDB
tidesdb.comยท5hยท
๐Ÿ”—Memory Linearization
Preview
Report Post
Guix Tricks: Managing secrets using password-store and run-time decryption scripts.
freakingpenguin.comยท12h
๐ŸšชEscape Hatch
Preview
Report Post
Cipher Mining (CIFR) Advances AI & HPC Infrastructure With Ulysses Site Buy
insidermonkey.comยท16h
๐Ÿ“กErlang BEAM
Preview
Report Post
How Data Travels: Packet Switching vs Circuit Switching
infosecwriteups.com
ยท23h
๐Ÿ“กProtocol Stacks
Preview
Report Post
Microsoft makes securing files faster with hardware-accelerated BitLocker
betanews.comยท12h
๐Ÿ“Šperf Tools
Preview
Report Post
Forget the Hype: Build and Break Your Own Blockchain in the Browser (No Install, 100% Private)
onlinetoolsx.comยท22hยท
Discuss: DEV
๐Ÿ”„Copy Propagation
Preview
Report Post
17 Strategies to Safeguard Your Online Identity
yahoo.comยท14h
๐Ÿ”—Hash Functions
Preview
Report Post
How Data Really Travels Over the Network (JSON vs Avro vs Protobuf)
medium.comยท11hยท
Discuss: r/programming
๐Ÿ“กNetwork Serialization
Preview
Report Post
๐ŸŽฒ The Automatic Grover Algorithm
lucamarx.comยท1d
๐ŸŽฏBit-Vector Algorithms
Preview
Report Post
The WPA Hash-based mining model provides a sustainable profit solution for BTC, XRP, and SOL users.
openpr.comยท2d
๐Ÿ—๏ธHash Tables
Preview
Report Post
Understanding the ForgeRock Password Storage Scheme (2024)
fusionauth.ioยท5dยท
Discuss: Hacker News
๐Ÿ”—Hash Functions
Preview
Report Post