๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Security Patterns
Zero Trust, Cryptography, Authentication, Authorization
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Using Clouds for too long might have made you incompetent
loudwhisper.me
ยท
2h
ยท
Discuss:
Hacker News
๐
Distributed systems
Rust Language Cheat Sheet
cheats.rs
ยท
14h
ยท
Discuss:
Hacker News
๐ฆ
Rust
Show HN: I automated code security to help vibe coders from getting busted
elara-app.ai
ยท
2h
ยท
Discuss:
Hacker News
๐ป
Programming languages
A Refreshing SQL Injection Discovery in Z-Push
xbow.com
ยท
2d
ยท
Discuss:
Hacker News
๐ง
Memory Management
Secure Your Keys with Keyand.me
thasso.xyz
ยท
1d
ยท
Discuss:
Hacker News
๐
Formal Methods
VPNs Promise Privacy But Often Deliver the Opposite
hackernoon.com
ยท
2d
๐
Distributed systems
Show HN: BinaryRPC โ Lightweight WebSocket-based RPC framework in modern C++
github.com
ยท
2h
ยท
Discuss:
Hacker News
๐ป
Programming languages
Cops say criminals use a Google Pixel with GrapheneOS โ I say thatโs freedom
androidauthority.com
ยท
7h
ยท
Discuss:
Hacker News
๐
Distributed systems
Playbook for Building Secure Cloud or Kubernetes Applications
medium.com
ยท
5d
ยท
Discuss:
Hacker News
๐งฉ
Microservices
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps
soatok.blog
ยท
3d
ยท
Discuss:
Hacker News
๐
Distributed systems
Revisiting my digital security model
manualdousuario.net
ยท
1d
ยท
Discuss:
Hacker News
๐
Formal Methods
Critical Analysis of the Meshtastic Protocol
disk91.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Distributed systems
Show HN: Please check out my Free OpenAPI audit tool
devunus.com
ยท
1d
ยท
Discuss:
Hacker News
๐งฉ
Microservices
Differences Between IAM, CIAM, and IDaaS in Modern Identity Management
guptadeepak.com
ยท
5d
ยท
Discuss:
Hacker News
๐๏ธ
Database Internals
Computer Scientists Figure Out How To Prove Lies
quantamagazine.org
ยท
3d
ยท
Discuss:
Lobsters
,
Hacker News
,
Hacker News
,
Hacker News
๐
Formal Methods
Show HN: Digital Arrest โ Stopping โน3 Cr Credential Fraud in Real-Time
everycred.com
ยท
4d
ยท
Discuss:
Hacker News
๐
Systems Monitoring
Setting Up Your Own Certificate Authority for Development
isc.sans.edu
ยท
3d
ยท
Discuss:
Hacker News
๐
Formal Methods
Open-Source Security Paradox: More Code, More Validation
onekey.so
ยท
3d
ยท
Discuss:
Hacker News
๐
Distributed systems
Contemplating Entity Component Architecture (2024)
datavirke.dk
ยท
1d
ยท
Discuss:
Hacker News
๐
Distributed systems
Malware found in official gravityforms plugin indicating supply chain breach
patchstack.com
ยท
12h
ยท
Discuss:
Hacker News
๐ป
Programming languages
Loading...
Loading more...
Page 2 »