Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Algorithms, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82253
posts in
229.5
ms
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
20h
·
Discuss:
DEV
🔒
security
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
10h
🌐
Network Security
Differential
Logic
• 4
inquiryintoinquiry.com
·
6h
🔤
c
privacy
professionals
: working at a
messaging/social
media platform
blog.avas.space
·
1h
🛡️
Cybersecurity
Digital
Footprint
Challenge
medium.com
·
5h
🔒
security
Fibonacci
number
certificates
johndcook.com
·
3d
·
Discuss:
Hacker News
🔒
security
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
14h
·
Discuss:
Hacker News
🔒
security
How To Go
Slow
artima.com
·
20h
⚡
Systems Programming
AI
Watermark
&
Stego
Scanner (Text + Code)
ulrischa.github.io
·
1d
·
Discuss:
Hacker News
🔒
security
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
2d
🛡️
Cybersecurity
Home
multi-module.org
·
11h
🔌
Embedded Systems
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
3d
🌐
Network Security
Elongme
leibal.com
·
4h
🔌
Embedded Systems
Jeffrey
Funk
.
Unicorns
, Hype, and Bubbles: A Guide to Spotting, Avoiding, and Exploiting Investment Bubbles in Tech
journals.sagepub.com
·
12h
🔌
Embedded Systems
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
·
8h
🔒
security
Networking
Fundamentals
dev.to
·
6h
·
Discuss:
DEV
🌐
Network Security
Data protection in the age of artificial intelligence: why
transparency
, control, and
humanity
are now crucial
igorslab.de
·
14h
🌐
Network Security
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
3d
🔒
security
Free online
toolbox
with 50+ useful tools – no ads, no
signup
required
strongtools.site
·
1d
·
Discuss:
r/SideProject
🌐
Network Security
Autocrypt
v2 - Post-Quantum and Reliable
Deletion
for Internet Messaging
autocrypt2.org
·
1d
🔒
security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help