Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Ciphers, Hash Functions, PKI
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186606
posts in
25.8
ms
Kubernetes
Security from the
Ground
Up
🔒
Network Security
medium.com
·
2d
krb5
_
allow
_weak_crypto (3) Linux Manual Page
🔐
Hardware Security
systutorials.com
·
6d
Catching
the Fly: Practical Challenges in Making Blockchain
FlyClient
Real
⛓️
Blockchain
arxiv.org
·
20h
Solving quantum computing's
longstanding
no-cloning
problem
🔐
Hardware Security
techtarget.com
·
1d
PEAKS No 42: The Open-Weight Uprising: GPT-5.5, Qwen Beats a
397B
Giant, and Your
Jira
Data Is Now AI Training Fuel
🔐
Hardware Security
bogdandeac.com
·
2d
Why C Remains the Gold
Standard
for
Cryptographic
Software
🔐
Hardware Security
wolfssl.com
·
6d
·
Lobsters
,
Hacker News
,
r/C_Programming
Red Hat's
Stratis
Storage 3.9 Released With Online
Encryption/Decryption/Reencryption
🔐
Hardware Security
phoronix.com
·
2d
·
r/linux
Quantum
Computers
Are Coming to Break
Cryptography
Faster Than Anyone Expected
🔐
Hardware Security
singularityhub.com
·
3d
Algorithms
in
Java
Series
📊
Algorithms
baeldung.com
·
1d
Full Disclosure: [
IWCC
2026] CfP: 15th International Workshop on Cyber Crime -
Linköping
, Sweden, Aug 24-27, 2026
🔒
Cybersecurity
seclists.org
·
1d
IPv7
: Identity-Centric Network Protocol for Security, Proxy Mitigation, and
Operability
🔒
Network Security
datatracker.ietf.org
·
5d
·
Hacker News
GnuPG
introduces support for post-quantum crypto
encryption
& 64-bit Windows improvements
🔐
Hardware Security
alternativeto.net
·
3d
Solana
keypair
as Identity explain by and for a beginner
🔐
Zero-Knowledge Proofs
release.anza.xyz
·
4d
·
DEV
base64
- What is base 64
encoding
used for?
🔒
Cybersecurity
stackoverflow.com
·
3d
PRAG
End-to-End
Privacy-Preserving
Retrieval-Augmented Generation
🔐
Zero-Knowledge Proofs
arxiv.org
·
20h
Week 17
🔒
Cybersecurity
thisweekin4n6.com
·
4d
SSH vs
SSL/TLS
— Lessons I Learned While Studying Cybersecurity and Solving Labs
🔒
Network Security
infosecwriteups.com
·
4d
I have to
renew
my
TLS
certificate every 47 days. What?!
🔐
Hardware Security
colinpaice.blog
·
5d
What is a
passkey
, how does it work and why is it better than a
password
?
🔒
Network Security
theguardian.com
·
6d
·
Hacker News
Quantum
Computers
Are Not A Threat To 128-bit
Symmetric
Keys
🔐
Hardware Security
lemmy.world
·
4d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help