๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“œ Smart Contracts

Solidity, Auditing, Formal Verification, DeFi Protocols

How Sui Move rethinks flash loan security
blog.trailofbits.comยท17h
๐Ÿ”’Hardware Security
General Security Concepts and Basic Cryptographic Principles
dev.toยท14hยท
Discuss: DEV
๐ŸงฎHomomorphic Encryption
Zoho Contracts Brings AI and CRM Integration to Simplify Small Business Legal Workflows
smallbiztrends.comยท9h
๐Ÿค–AI
Preventing the NPM Debug/Chalk Compromise in 200 lines of JavaScript
getvouchsafe.orgยท2hยท
Discuss: Hacker News, r/javascript, r/node
๐Ÿ”’Hardware Security
Should I use this Go bi-temporal event store, pick another, or build my own?
github.comยท1dยท
Discuss: r/golang
๐Ÿ”’Hardware Security
Exploring Canton: a privacy-preserving distributed ledger for finance
quant.engineeringยท6hยท
Discuss: Hacker News
๐Ÿ”’Hardware Security
Verification power of rational-valued automata with deterministic and affine states
arxiv.orgยท1d
โœ…Formal Verification
How to Prove False Statements: Practical Attacks on Fiat-Shamir
eprint.iacr.orgยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”Zero-Knowledge Proofs
A Timeline of Public Key Infrastructure: What Worked, What Failed, and Whatโ€™s Next
hackernoon.comยท1d
๐Ÿ”’Hardware Security
A blueprint for AI-driven fintech transformation
nordot.appยท15h
๐Ÿ›ก๏ธAI Safety
Blockchain-Based Subscription Models with Smart Contract Automation
dev.toยท2dยท
Discuss: DEV
๐ŸฅMedical Privacy
Designing software architecture for parallel AI sessions
rashidazarang.comยท8hยท
Discuss: Hacker News
๐Ÿค–AI
Smart Verification for Complex UCIe Multi-Die Architectures
semiwiki.comยท2d
๐Ÿ”’Hardware Security
Why sandboxing matters now โ€” and how to choose one that gives you facts, not fiction
vmray.comยท19h
๐Ÿ”’Hardware Security
U.S. PQFIF Highlights BTQ's QSSN for Post-Quantum Digital Money; QuINSA Unanimously Advances QSSN as a Global Standards Initiative
prnewswire.comยท11h
๐Ÿ”—Crypto
ActiveState and RL: Unlocking Software Supply Chain Security
reversinglabs.comยท13h
๐Ÿ”’Hardware Security
Standards for Age Verification
avpassociation.comยท10hยท
Discuss: Hacker News
โœ…Formal Verification
What qualifies for Red Hat Developer Subscription for Teams?
developers.redhat.comยท1d
๐Ÿ”„Protocol Design
Monitor Windows Certificate Store with Datadog
datadoghq.comยท1d
๐Ÿ”’Hardware Security
Which OAuth Flow Should You Use?
nimblesa.comยท10hยท
Discuss: Hacker News
๐Ÿ”Zero-Knowledge Proofs
Loading...Loading more...
AboutBlogChangelogRoadmap