Feeds to Scour
SubscribedAll
Scoured 256339 posts in 950.9 ms
Securing Legacy Android Apps: Modern Encryption Practices
thenewstack.ioยท1d
๐Ÿ”—Hash Functions
Preview
Report Post
Performance Hints for BigQuery
trmlabs.comยท8hยท
Discuss: Hacker News
๐Ÿ“ˆQuery Optimization
Preview
Report Post
<p>**Abstract:** This paper proposes a novel framework for Federated Quantum Key Distribution (FQKD) integrating adaptive trust management mechanisms to enhance...
freederia.comยท2h
๐Ÿ”—Hash Functions
Preview
Report Post
robertsdotpm/namebump: Namebump is a registrationless, key-authenticated name registry where writes bump prior values.
github.comยท5hยท
Discuss: Hacker News
๐Ÿ—๏ธHash Tables
Preview
Report Post
Introducing the XLab AI Security Guide
lesswrong.comยท10h
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Symmetric vs. Asymmetric Cryptography (What Actually Matters)
blog.ellipticc.comยท1d
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Titan Quest/Characters
allthetropes.orgยท3h
๐Ÿ”—Hash Functions
Preview
Report Post
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge
dev.toยท12hยท
Discuss: DEV
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
[Discussion] The "Noise" Bottleneck in Local 8B RAG โ€“ A comparison of cleaning strategies (Regex vs. Unstructured vs. Entropy)
reddit.comยท8hยท
Discuss: r/LocalLLaMA
๐ŸงชParser Testing
Preview
Report Post
What I Learned Building a Storage Engine That Outperforms RocksDB
tidesdb.comยท5hยท
๐Ÿ”—Memory Linearization
Preview
Report Post
Guix Tricks: Managing secrets using password-store and run-time decryption scripts.
freakingpenguin.comยท12h
๐ŸšชEscape Hatch
Preview
Report Post
Cipher Mining (CIFR) Advances AI & HPC Infrastructure With Ulysses Site Buy
insidermonkey.comยท16h
๐Ÿ“กErlang BEAM
Preview
Report Post
How Data Travels: Packet Switching vs Circuit Switching
infosecwriteups.com
ยท23h
๐Ÿ“กProtocol Stacks
Preview
Report Post
Microsoft makes securing files faster with hardware-accelerated BitLocker
betanews.comยท12h
๐Ÿ“Šperf Tools
Preview
Report Post
17 Strategies to Safeguard Your Online Identity
yahoo.comยท13h
๐Ÿ”—Hash Functions
Preview
Report Post
Forget the Hype: Build and Break Your Own Blockchain in the Browser (No Install, 100% Private)
onlinetoolsx.comยท22hยท
Discuss: DEV
๐Ÿ”„Copy Propagation
Preview
Report Post
How Data Really Travels Over the Network (JSON vs Avro vs Protobuf)
medium.comยท11hยท
Discuss: r/programming
๐Ÿ“กNetwork Serialization
Preview
Report Post
๐ŸŽฒ The Automatic Grover Algorithm
lucamarx.comยท1d
๐ŸŽฏBit-Vector Algorithms
Preview
Report Post
The WPA Hash-based mining model provides a sustainable profit solution for BTC, XRP, and SOL users.
openpr.comยท2d
๐Ÿ—๏ธHash Tables
Preview
Report Post
Understanding the ForgeRock Password Storage Scheme (2024)
fusionauth.ioยท5dยท
Discuss: Hacker News
๐Ÿ”—Hash Functions
Preview
Report Post