Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Encryption
Specific
cryptography, AES, TLS, end-to-end encryption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187070
posts in
46.8
ms
Additive
Cryptography for
TLS
🔑
Cryptography
snkth.com
·
6d
Storing
Passwords
Securely
🔓
Password Cracking
patrickmn.com
·
8h
Encryption
breaking technology is now 20x cheaper and
CEOs
should be very worried
🔐
Post-Quantum Crypto
techradar.com
·
26m
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
🐧
Kernel Security
news.ycombinator.com
·
1d
·
Hacker News
Post-quantum encryption for Cloudflare
IPsec
is
generally
available
🔐
Quantum Security
blog.cloudflare.com
·
19h
·
Hacker News
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
🌊
Stream Ciphers
github.com
·
4d
·
r/rust
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
☁️
Cloud Security
medium.com
·
4d
Asiadav/OpenPBKDF2
: An open-source ASIC implementation of the PBKDF2 algorithm using SHA256 encryption
🔍
Linux BPF
github.com
·
8h
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
🔐
Post-Quantum Cryptography
news.opensuse.org
·
3d
From
Rerandtopia
to
Interceptopia
, the Anamorphic Encryption Saga Rises
🔐
Post-Quantum Cryptography
eprint.iacr.org
·
5d
Secure
Messenger
for Organizations (End-to-End
Encrypted
)
🔒
TLS/SSL
wire.com
·
3d
·
Hacker News
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
🔐
Quantum Security
mindmapvault.com
·
6d
·
DEV
openSUSE
Lands Post-Quantum Hybrid Cryptography in Leap and
Tumbleweed
🔐
Post-Quantum Cryptography
9to5linux.com
·
3d
SSH vs
SSL/TLS
— Lessons I Learned While Studying Cybersecurity and Solving Labs
🔒
Protocol Verification
infosecwriteups.com
·
5d
Red Hat's
Stratis
Storage 3.9 Released With Online
Encryption/Decryption/Reencryption
🔐
HSM Integration
phoronix.com
·
3d
·
r/linux
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
🌐
DNS Security
medium.com
·
6d
The FBI Says
Warrant-Proof
Encryption
Is A Public Safety Problem - Here's What It Means
🎭
Obfuscation
slashgear.com
·
3d
Cryptography
challenges @
KalmarCTF
2026
🐛
Fuzzing
blog.zksecurity.xyz
·
3d
·
Hacker News
krtab/agnos
: Obtain (wildcard) certificates from let's encrypt using dns-01 without the need for API access to your DNS provider.
🔒
Runtime Security
github.com
·
6d
Practical Post-Quantum Secure
Publicly
Verifiable
Secret Sharing and Applications
🔐
Post-Quantum Cryptography
eprint.iacr.org
·
6d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help