🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Security Patterns

Zero Trust, Cryptography, Authentication, Authorization

Zero Trust in Reverse: Why the Definition of Zero Trust Is Only Half Full
threatresearch.ext.hp.com·15h·
Discuss: Hacker News
🌐Distributed systems
A Timeline of Public Key Infrastructure: What Worked, What Failed, and What’s Next
hackernoon.com·2d
🌐Distributed systems
Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night
securityboulevard.com·1h·
Discuss: Hacker News
📐Formal Methods
Shamir's Secret Sharing
en.wikipedia.org·1d·
Discuss: Hacker News
📏Linear Types
You Already Have Our Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
labs.watchtowr.com·18h·
Discuss: Hacker News
🏹Apache Arrow
The Supply Chain Is the New Watering Hole
material.security·21h·
Discuss: Hacker News
🌊Stream Processing
Which OAuth Flow Should You Use?
nimblesa.com·18h·
Discuss: Hacker News
📦Data Serialization
Exploring Canton: a privacy-preserving distributed ledger for finance
quant.engineering·14h·
Discuss: Hacker News
🌐Distributed systems
Why Todays Identity and Access Management Can't Survive the AI Age
identityfusion.com·10h·
Discuss: Hacker News
🌐Distributed systems
Coco – Solving the Expression Problem in Standard OO (Java, C#, Scala, ..)
drops.dagstuhl.de·1h·
Discuss: Hacker News
💻Programming languages
Preventing the NPM Debug/Chalk Compromise in 200 lines of JavaScript
getvouchsafe.org·9h·
Discuss: Hacker News, r/javascript, r/node
📦Data Serialization
Supply chains and watering holes
cryptography.dog·1d·
Discuss: Lobsters
🌐Distributed systems
Securing MCP Servers
corgea.com·2d·
Discuss: Hacker News
📮Message Queues
Zero-knowledge proofs unlock privacy in digital identity
hopae.com·3d·
Discuss: Hacker News
🌐Edge Computing
A Short Introduction to Tor
spec.torproject.org·1d·
Discuss: Hacker News
📏Linear Types
Karate – Test Automation Made Simple
karatelabs.github.io·21h·
Discuss: Hacker News
💻Programming languages
53 Years of Public Key Infrastructure and It's Still Broken?
hackernoon.com·2d
🌐Distributed systems
X Open Sourced Algorithm Code, So I analyzed it to learn how to grow on X
supabird.io·16h·
Discuss: Hacker News
🌊Stream Processing
How We Built Our Model-Agnostic Agent for Log Analysis
blog.runreveal.com·19h·
Discuss: Hacker News
🌊Stream Processing
FedCM: A New Proposed Identity Standard That Could Change How We Log in On
infoq.com·2d·
Discuss: Hacker News
🌐Edge Computing
Loading...Loading more...
AboutBlogChangelogRoadmap