Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ ChaCha20
Stream Cipher, Cryptography, Performance, AEAD
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74096
posts in
740.7
ms
Introducing
winpulse
lmno.lol
ยท
21h
๐ฎ
QEMU TCG
๐ฆ Lance x
DuckDB
SQL Retrieval, ๐ Uber-Scale Storage, โก 1.5M
IOPS
lancedb.com
ยท
1d
๐ฏ
Lance
Mojo
Jojo CTF OSINT Serial Killer chain
writeups
medium.com
ยท
1d
๐
Binary Exploitation
Presentation: Are You Missing a Data Frame? The Power of Data
Frames
in
Java
infoq.com
ยท
1d
๐ปโโ๏ธ
Polars
Main
Content ||
Math
โฉ Programming
jeremykun.com
ยท
1d
๐
Algorithms
Advancing
AI
benchmarking
with Game Arena
dev.to
ยท
3h
ยท
Discuss:
DEV
๐งฉ
mimalloc
A
practical
systems engineering guide:
Architecting
AI-ready infrastructure for the agentic era
thenewstack.io
ยท
23h
๐ฆ
Ollama
Blockchain
Is a
Galactic
Algorithm
shakeddown.substack.com
ยท
8h
ยท
Discuss:
Substack
โ๏ธ
Blockchain
CIC-Trap4Phish
: A Unified Multi-Format Dataset for Phishing and
Quishing
Attachment Detection
arxiv.org
ยท
16h
๐น
Robin Hood Hashing
I2PChat
| Secure P2P Instant
Messenger
vituperative.github.io
ยท
18h
ยท
Discuss:
Hacker News
๐ธ๏ธ
Libp2p
An introduction to
lockless
algorithms [
LWN.net
]
lwn.net
ยท
1d
๐
Lock-Free Programming
Hitting
1,000
tokens
per second on a single RTX 5090
blog.alpindale.net
ยท
1d
ยท
Discuss:
Hacker News
,
Hacker News
๐
CPU Pinning
A
pattern
for safe
database
access with AI coding agents
docs.getpochi.com
ยท
2h
ยท
Discuss:
Hacker News
๐
Two-Phase Locking
Network function
computation
with
vector
linear target function and security function
arxiv.org
ยท
16h
๐ข
Homomorphic Encryption
Building a Scalable
URL
Shortener
github.com
ยท
10h
ยท
Discuss:
DEV
#๏ธโฃ
Perfect Hashing
Claude
Opus
4.6: System Card Part 1:
Mundane
Alignment and Model Welfare
lesswrong.com
ยท
1d
๐
Capability Systems
LLMs
Refuse
High-Cost Attacks but Stay
Vulnerable
to Cheap, Real-World Harm
expectedharm.github.io
ยท
16h
ยท
Discuss:
Hacker News
๐
BPF LSM
Using an AI agent to design and ship a Rust
diff
fingerprinting
algorithm
argos-ci.com
ยท
21h
ยท
Discuss:
Hacker News
โก
Ruff
Making
Waffles
with Group
Theory
hmpcabral.com
ยท
1d
ยท
Discuss:
Hacker News
๐ข
Homomorphic Encryption
Obsidian
+ Claude Code is Beyond
Useful
emergentinsights.substack.com
ยท
23h
ยท
Discuss:
Substack
๐๏ธ
Obsidian
Loading...
Loading more...
« Page 3
โข
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help