Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
143
posts in
17.2
ms
Operationalising Post Quantum
TLS
Automated Configuration Profiling and Hybrid PQC Deployment in Financial Infrastructure
🔐
Hardware Security
arxiv.org
·
2d
Quality Outreach Heads-up - JDK 27: Post-Quantum Hybrid
Key
Exchange
for
TLS
1.3
🔐
Hardware Security
inside.java
·
4d
LatticeShield – Quantum-safe reverse proxy in pure Rust, no FFI
🔐
Hardware Security
github.com
·
14h
·
Hacker News
Ethereum plans to move from BLS
signatures
to post quantum secure
signatures
⛓️
Blockchain
hashcloak.com
·
11h
·
Hacker News
RFC 9807: The OPAQUE Augmented Password-Authenticated
Key
Exchange
(aPAKE) Protocol
🔒
Network Security
datatracker.ietf.org
·
2d
·
DEV
RHEL 10.2 Released with Post-Quantum SSH and Kernel Livepatching
🔄
DevOps
linuxiac.com
·
6h
Reverse engineering Android malware from popular Chinese projectors
🦠
Malware Analysis
zanestjohn.com
·
3d
·
Lobsters
,
Hacker News
Post-Quantum
Cryptography
(PQC) Analysis
🔐
Hardware Security
ntop.org
·
2d
QIZ Security teams up with Google Cloud to help enterprises brace for the quantum
cryptography
threat
🔐
Hardware Security
thenextweb.com
·
15h
See You at Y10K: From Millennium Bugs to Quantum Midnight
🔐
Hardware Security
space.gekko.de
·
2d
·
Hacker News
Q Day Preparedness: White Paper & Recommendations
🔒
Network Security
icitech.org
·
13h
128-Bit Computing
📊
Profiling
en.wikipedia.org
·
4d
·
Hacker News
WD securing disk drives with post-quantum
cryptography
🔐
Hardware Security
blocksandfiles.com
·
2d
JWT Tokens Decoded: What's Actually Inside Your Auth Token
🔒
Network Security
snappytools.app
·
17h
·
DEV
A shallow dive into formal verification
🔐
Zero-Knowledge Proofs
vitalik.eth.limo
·
2d
·
Hacker News
,
Hacker News
Mini Shai Hulud: Compromised @antv npm packages enable
CI/CD
credential theft
📁
Dotfiles
microsoft.com
·
10h
Which VPN Services Allow Torrenting? * TorrentFreak
🔒
Network Security
torrentfreak.com
·
4d
JA3 and JA4 Fingerprints in AWS WAF and Beyond
🔒
Network Security
doit.com
·
1d
Draft executive order would set deadlines for
digital
signature
and
key
quantum encryption
🔒
Network Security
malware.news
·
8h
CySecurity News - Latest Information Security and Hacking Incidents: 4
Key
Areas in 2026 for Organisation Safety Against Advanced AI Threats
🔒
Cybersecurity
cysecurity.news
·
2d
·
Blogger
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help