Feeds to Scour
SubscribedAll
Scoured 258049 posts in 3.18 s
Introducing the XLab AI Security Guide
lesswrong.com·7h
🏰Capability Machines
Preview
Report Post
The Future of Secure Computing Begins with Read-Only Endpoints
securityinfowatch.com·1d
🛡️Capability VMs
Preview
Report Post
Friendly Little Wrapper Types — Sympolymathesy, by Chris Krycho
v5.chriskrycho.com·2h
🔧API Design
Preview
Report Post
Building Cryptographically Enforced Time-Locked Vaults on Cloudflare's Edge
dev.to·9h·
Discuss: DEV
🔗Hash Functions
Preview
Report Post
Symmetric vs. Asymmetric Cryptography (What Actually Matters)
blog.ellipticc.com·1d
🔗Hash Algorithms
Preview
Report Post
Project idea: Bring “Enterprise-Grade” SWG/DLP Concepts to the Homelab as an Easy Docker Privacy Gateway
reddit.com·1d·
Discuss: r/selfhosted
🛡️Capability VMs
Preview
Report Post
To sign or not to sign: Practical vulnerabilities in GPG & friends (39c3)
cdn.media.ccc.de·5h
🏷️Memory Tagging
Preview
Report Post
Fuzzing.in
fuzzing.in·2h
🎲Parser Fuzzing
Preview
Report Post
Guix Tricks: Managing secrets using password-store and run-time decryption scripts.
freakingpenguin.com·9h
🚪Escape Hatch
Preview
Report Post
Light-Weight Contexts: An OS Abstraction for Safety and Performance
usenix.org·1d
📡Binary Protocols
Preview
Report Post
Department of Computer Science and Technology – Technical reports: UCAM-CL-TR-949
cl.cam.ac.uk·2h·
Discuss: Hacker News
🏰Capability Machines
Preview
Report Post
My First Step into Security: Building a Zero-Knowledge Vault
blog.thnkandgrow.com·1d
🔗Hash Functions
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.io·8h·
Discuss: DEV
🎮Language Ergonomics
Preview
Report Post
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography: Singh, Simon: 9780385495325: Amazon.com: Books
amazon.com·1h
🔐Security Types
Preview
Report Post
Virtualization: Theory to Silicon
pooladkhay.com·11h·
Discuss: Hacker News
🖥️Minimal VMs
Preview
Report Post
Securing Legacy Android Apps: Modern Encryption Practices
thenewstack.io·1d
🔗Hash Functions
Preview
Report Post
Cybersecurity Snapshot: 2025 Rewind: Essential Cyber Insights, Strategies and Tactics
tenable.com·1d
🛡️Capability Security
Preview
Report Post
Solved: TryHackMe Co-founder AMA: Get Hired in Cyber Security & Build Elite Teams.
wp.me·7h·
Discuss: DEV
🚂Cranelift IR
Preview
Report Post
<p>**Abstract:** This paper introduces a novel framework, Automated Protocol Refinement for Enhanced Algorithm Validation (APREAV), to significantly improve the...
freederia.com·14h
🤖Abstract Machines
Preview
Report Post
Securing AI Agents with Information Flow Control (Part II)
infosecwriteups.com
·6d
🏰Capability Machines
Preview
Report Post