🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Security Patterns

Zero Trust, Cryptography, Authentication, Authorization

Comprehensive Overview of the Identity Management Ecosystem in 2025
guptadeepak.com·1d·
Discuss: DEV, Hacker News
📊Systems Monitoring
How Nexo Is Building Institutional-Grade Confidence in Crypto
hackernoon.com·9h
🧩Microservices
Updated Digital Identity Guidelines are Here (NIST 800-63 Revision 4)
csrc.nist.gov·2h·
Discuss: Hacker News
📐Formal Methods
Lobsters Interview with Icefox
lobste.rs·7h·
Discuss: Lobsters
💻Programming languages
How to Secure a Linux Server
github.com·12h·
Discuss: Hacker News
🌐Distributed systems
Encrypted Client Hello Approved for Publication
feistyduck.com·1d·
Discuss: Hacker News
💻Programming languages
Hijacking multi-agent systems in your PajaMAS
blog.trailofbits.com·1d·
Discuss: Hacker News
🌐Distributed systems
Are Cyber Defenders Winning? – Lawfare
lawfaremedia.org·21h·
Discuss: Hacker News
🌐Distributed systems
Self-Signed JWTs
selfref.com·5h·
Discuss: Hacker News
🔷Typescript
Understanding Blockchains Through Java Code
blog.blockingqueue.com·1d·
Discuss: Hacker News
🏹Apache Arrow
How attackers are still phishing "phishing-resistant" authentication
bleepingcomputer.com·2d·
Discuss: Lobsters
📦Data Serialization
Computer Networking a Top-Down Approach, 9th Edition
gaia.cs.umass.edu·17h·
Discuss: Hacker News
🌐Distributed systems
The Ghost in the Graph, Pt. 1: How Beliefs Become Organizational Behavior
vasily.cc·2d·
Discuss: Hacker News
🌐Distributed systems
Practical Guide to Personal Data Security: Balancing Usability and Protection
guptadeepak.com·3d·
Discuss: Hacker News
📊Systems Monitoring
Still Up. Still Evil
vulncheck.com·1d·
Discuss: Hacker News
📮Message Queues
The State of Post-Quantum Cryptography in Rust: The Belt Is Vacant
blog.projecteleven.com·1d·
Discuss: Hacker News
🦀Rust
TLS and QUIC: A Masochist's Guide
quic.video·2d·
Discuss: Hacker News
🧩Microservices
A Practitioner's Taxonomy of IaC Patterns in the Wild
chkk.io·3d·
Discuss: Hacker News
🌐Distributed systems
Top Anonymous Email Services for Privacy Lovers
cyble.com·13h·
Discuss: Hacker News
📮Message Queues
Deepfakes and the War on Trust
thecipherbrief.com·8h·
Discuss: Hacker News
📐Formal Methods
Loading...Loading more...
AboutBlogChangelogRoadmap