๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Zero-Knowledge Proofs
ZK-SNARKs, Bulletproofs, Privacy, Verifiable Computation
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
The (sometimes rocky) road to a paper
lmao.bearblog.dev
ยท
1d
ยท
Discuss:
Hacker News
๐
Cryptography
OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security
eprint.iacr.org
ยท
3d
๐
Cryptography
IdentityMesh: Exploiting Lateral Movement in Agentic Systems
lasso.security
ยท
10h
ยท
Discuss:
Hacker News
๐
Vulnerability Research
Show HN: Storing private blogs on public internet with 0 verifications
sgaud.com
ยท
8h
ยท
Discuss:
Hacker News
๐
Vulnerability Research
Blue โ ecosystem to scale KV store to an exabyte in the open source world
github.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Cryptography
Show HN: I built a tool that turns cryptography papers into working Python code
paperstoapp.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Cryptography
IRHash: Efficient Multi-Language Compiler Caching by IR-Level Hashing
usenix.org
ยท
10h
ยท
Discuss:
Hacker News
,
r/programming
๐
Cryptography
Why Powerful But Hard To Detect Backdoors Could Become A Routine Problem For Open Source Projects Because Of AI
techdirt.com
ยท
16h
ยท
Discuss:
Hacker News
๐
Vulnerability Research
Strategies for securing non-human identities (services, workloads, AI agents)
cerbos.dev
ยท
7h
ยท
Discuss:
Hacker News
,
r/programming
๐
Cryptography
Stress testing Biome's noFloatingPromises lint rule
vercel.com
ยท
1d
ยท
Discuss:
Hacker News
๐ฆ
Rust
Rust for Linux โ Encoding the trust of data in the type system
lwn.net
ยท
1d
ยท
Discuss:
Hacker News
๐ฆ
Rust
Galactic Algorithm
en.wikipedia.org
ยท
1d
ยท
Discuss:
Hacker News
๐
Cryptography
The Angels and Demons of Nondeterminism
buttondown.com
ยท
1d
ยท
Discuss:
Hacker News
โ
Formal Methods
Subverting code integrity checks to locally backdoor Signal, 1Password, Slack, and more
blog.trailofbits.com
ยท
1d
ยท
Discuss:
Lobsters
,
Hacker News
๐
Vulnerability Research
Hackers use Ethereum smart contracts to conceal malware in code libraries
theblock.co
ยท
1d
ยท
Discuss:
Hacker News
๐
Vulnerability Research
Unleashing the Hound: How AI Agents Find Deep Logic Bugs in Any Codebase
muellerberndt.medium.com
ยท
15h
ยท
Discuss:
Hacker News
๐
Vulnerability Research
Protobuffers Are Wrong
reasonablypolymorphic.com
ยท
4h
ยท
Discuss:
Hacker News
,
r/programming
โ
Formal Methods
I Ditched Docker for Podman (and You Should Too)
codesmash.dev
ยท
7h
ยท
Discuss:
Hacker News
,
r/programming
๐ฆ
Rust
Polynomial determined by two inputs (2012)
johndcook.com
ยท
2d
ยท
Discuss:
Hacker News
โ
Formal Methods
Why RDF Is the Natural Knowledge Layer for AI Systems
bryon.io
ยท
13h
ยท
Discuss:
Hacker News
โ
Formal Methods
Loading...
Loading more...
Page 2 »