Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81224
posts in
652.0
ms
The Rise of Sparse
Mixture-of-Experts
:A Survey from Algorithmic
Foundations
to Decentralized Architectures and Vertical Domain Applications
arxiv.org
·
16h
🌱
Minimal ML
CIC-Trap4Phish
: A Unified Multi-Format Dataset for Phishing and
Quishing
Attachment Detection
arxiv.org
·
16h
🛡️
Parser Security
Making
Waffles
with Group
Theory
hmpcabral.com
·
1d
·
Discuss:
Hacker News
🧮
Combinator Calculus
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
1d
🔄
Subinterpreters
Geospatial
System Design
Patterns
systemdr.substack.com
·
2d
·
Discuss:
Substack
💾
Persistent Heaps
The
Styx
Architecture for
Distributed
Systems (1999)
inferno-os.org
·
1d
·
Discuss:
Hacker News
🌍
HTTP Servers
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
1d
·
Discuss:
Substack
🌍
HTTP Servers
ubiquitycluster/ubiquity
github.com
·
3h
🛡️
Capability VMs
Analysis of
Hashrate-Based
Double Spending
dev.to
·
2d
·
Discuss:
DEV
🏗️
Hash Tables
The State of
Agentic
Graph
RAG
localoptimumai.substack.com
·
9h
·
Discuss:
Substack
🗂️
Term Indexing
Uncovering
Hidden
Informations
whiteravendev.itch.io
·
2d
🔍
Execution Tracing
Explanation
of key
concepts
in a cloud computing
dev.to
·
7h
·
Discuss:
DEV
🛡️
Capability VMs
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
2d
🛡️
Security Type Systems
Pretty Printing the ART (Adaptive
Radix
Tree) in
DuckDB
artjomplaunov.github.io
·
1d
🤐
Zipper Structures
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
23h
·
Discuss:
Hacker News
🛡️
Error Boundaries
How the GNU C Compiler became the
Clippy
of
cryptography
theregister.com
·
1d
·
Discuss:
Hacker News
,
r/programming
📚
Stack Allocation
What should I program?
jamesmcm.github.io
·
2d
🏗️
Minimal Compilers
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
5d
🔗
Hash Functions
About the Information System on Graph
Classes
and their
Inclusions
graphclasses.org
·
1d
🔗
Graph Rewriting
DKnife
targets network gateways in long running
AitM
campaign
csoonline.com
·
1d
📊
Profiling
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help