Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π ChaCha20
Stream Cipher, Cryptography, Performance, AEAD
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
72986
posts in
1.21
s
Nonlinear random walks on
hypergraphs
characterized
by higher-order interactions
sciencedirect.com
Β·
2d
πΈοΈ
Graph Theory
Build an Agent with
Nanobot
, Lighter Replacement for
OpenClaw
analyticsvidhya.com
Β·
2d
π¬
Prompt Engineering
I Built an API for LLM
JSON
Validation
in Rust
dev.to
Β·
18h
Β·
Discuss:
DEV
β‘
FastAPI
The
Impossibility
of
Strategyproof
Rank Aggregation
arxiv.org
Β·
1d
π»ββοΈ
Polars Lazy
Sequential
Auditing
for f-Differential Privacy
arxiv.org
Β·
1d
π
Differential Privacy
What do you guys think of my
microservice
template
?
github.com
Β·
2d
Β·
Discuss:
r/node
π―
Microservices
Released
genai
v0.1.0: a
sane
Go AI SDK
maruel.ca
Β·
4d
Β·
Discuss:
r/golang
ποΈ
Pavex
Building
Tabularis
: A Developer's Database Tool That Doesn't
Suck
dev.to
Β·
23h
Β·
Discuss:
DEV
π₯
DataFusion
AI
Watermark
&
Stego
Scanner (Text + Code)
ulrischa.github.io
Β·
2d
Β·
Discuss:
Hacker News
π
Fingerprinting
msolomon/keybearer
: Allow M of N friends to combine secret passwords to unlock your file.
github.com
Β·
3d
π’
Homomorphic Encryption
What is
DeepSeek
and why does it
matter
?
zapier.com
Β·
2d
π±
Edge AI
IAM
Security
Audit
tolubanji.com
Β·
2d
Β·
Discuss:
DEV
π
Security
Your AI Agent Has No
Armor
: A Technical Security Analysis of
OpenClaw
evil.example.com
Β·
3d
Β·
Discuss:
DEV
π‘οΈ
AI Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
Β·
4d
Β·
Discuss:
Substack
π‘οΈ
AI Security
On The
Crank
Spectrum
exple.tive.org
Β·
3d
Β·
Discuss:
Lobsters
,
Hacker News
β‘
LMAX Disruptor
What should I program?
jamesmcm.github.io
Β·
2d
π¦
Rust
Show HN:
A2A
Protocol
β Infrastructure for an Agent-to-Agent Economy
news.ycombinator.com
Β·
2d
Β·
Discuss:
Hacker News
πΌ
Thrift
I Built a 6
BIPS
JIT
in Five Months
unlikelyemphasis.substack.com
Β·
4d
Β·
Discuss:
Substack
βοΈ
JIT Compilation
A
Horrible
Conclusion
addisoncrump.info
Β·
2d
Β·
Discuss:
Lobsters
,
Hacker News
π
Binary Exploitation
Open
Molten
Claw
idiallo.com
Β·
3d
Β·
Discuss:
Hacker News
π
Binary Exploitation
Loading...
Loading more...
« Page 7
β’
Page 9 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help