Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2595
posts in
40.8
ms
Secure Boot (
Gentoo
Wiki
)
wiki.gentoo.org
·
3h
·
Discuss:
Hacker News
🐧
Linux
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
18h
·
Discuss:
Hacker News
🏗️
Software Design
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
1h
·
Discuss:
Hacker News
📐
System Design
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
4h
·
Discuss:
Hacker News
🔍
Reverse Engineering
Show HN:
SubAnalyzer
subdomain
discovery and external attack surface map tool
subanalyzer.com
·
3h
·
Discuss:
Hacker News
📐
System Design
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csa) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
·
3d
·
Discuss:
Hacker News
🐧
Linux
The Security
Gap
in MCP: The Hidden Risks No One Is
Talking
About
memgraph.com
·
2d
·
Discuss:
Hacker News
🔍
Reverse Engineering
CISA
gives federal agencies one year to
rip
out end-of-life devices
therecord.media
·
3d
·
Discuss:
Hacker News
🔋
Electronics
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
·
2d
·
Discuss:
Hacker News
🏗️
Software Design
Google's Cyber
Disruption
Unit
Kicks
Its First Goal
lawfaremedia.org
·
2d
·
Discuss:
Hacker News
📐
System Design
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
2d
·
Discuss:
Hacker News
🐧
Linux
We have
broken
SHA-1
in practice
shattered.io
·
1d
·
Discuss:
Hacker News
💻
Programming
ICE and
CBP
’s Face-Recognition App Can’t Actually
Verify
Who People Are
wired.com
·
3d
·
Discuss:
Hacker News
🔍
Reverse Engineering
Going Through
Snowden
Documents
, Part 5
libroot.org
·
1d
·
Discuss:
Hacker News
🔍
Reverse Engineering
Sammā
Suit – Open-source security armor for AI agents (all 8 layers
enforced
)
sammasuit.com
·
2d
·
Discuss:
Hacker News
🐧
Linux
Notes from the Asia-Pacific region: Breach exposes
gaps
in
NZ
's privacy framework
iapp.org
·
2d
·
Discuss:
Hacker News
🗃️
Databases
The
Importance
of Physical Touch for
Proving
You're Human
bengoldhaber.substack.com
·
55m
·
Discuss:
Substack
💻
Programming
Spying
Chrome Extensions: 287 Extensions
spying
on
37M
users
qcontinuum.substack.com
·
8h
·
Discuss:
Substack
🖥️
Self-Hosting
Betterment
data breach
exposes
1.4 million customers
americanbanker.com
·
13h
·
Discuss:
Hacker News
🐘
Postgres
Re-Identification
vs
Anonymization
Strength
testingbranch.com
·
23h
·
Discuss:
Hacker News
🔍
Reverse Engineering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help