Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74744
posts in
433.1
ms
Azerbaijan
sheds
light on forecast for global digital payment users by 2027
trend.az
·
6d
🔒
Digital Privacy
C is for
Cybersecurity
dev.to
·
6d
·
Discuss:
DEV
🔒
Security
GPG
Update 2026
euroquis.nl
·
6d
🛡️
AMD SEV
improving
security + privacy w/ current
setup
discuss.privacyguides.net
·
6d
🔐
Capability Systems
Post-Quantum Identity-Based
TLS
for
5G
Service-Based Architecture and Cloud-Native Infrastructure
arxiv.org
·
4d
🔢
Homomorphic Encryption
Detecting
Phishing
Patterns in Go: A Zero-Budget Approach for Senior
Architects
dev.to
·
6d
·
Discuss:
DEV
#️⃣
Perfect Hashing
Securing
the Digital Frontier: Navigating New
Vulnerabilities
orfonline.org
·
6d
🔒
Security
Privacy-Preserving Dynamic Average
Consensus
by
Masking
Reference Signals
arxiv.org
·
3d
🔒
Differential Privacy
Need for Speed: AI, Security, and
Productivity
pentesterlab.com
·
6d
🛡️
AI Security
AT&T
breach
data
resurfaces
with new risks for customers
malwarebytes.com
·
6d
🔒
Security
Notepad
++ infrastructure
hijacked
by Chinese APT in sophisticated supply chain attack
csoonline.com
·
6d
🔓
Binary Exploitation
New post
phonon.cc
·
6d
🐧
Linux
Ysgrifennu
Côd
yn Gymraeg (Writing Code in Welsh)
hackaday.com
·
6d
🔨
Compiler Design
Secure element on
ESP32-S3
github.com
·
6d
·
Discuss:
r/embedded
🦅
Falco
**Abstract:** This paper introduces a novel framework for enhanced
trace
evidence identification utilizing a multi-modal data
ingestion
and analysis pipeline...
freederia.com
·
5d
🔍
Digital Forensics
**Abstract:** This paper presents a methodology for assessing topological vulnerabilities in stochastic granular materials, specifically those
exhibiting
dyn
...
freederia.com
·
5d
🔲
Cellular Automata
Properly
securing
OpenClaw
with authentication
haproxy.com
·
6d
·
Discuss:
Hacker News
🔐
WireGuard
What
Color
is Your
Function
?
journal.stuffwithstuff.com
·
6d
λ
Functional Programming
nilpunch/massive-ecs
:
Bitset-based
ECS with rollbacks. C# library and Unity package.
github.com
·
5d
🎮
Bevy ECS
Home
microsoft.github.io
·
6d
🔍
eBPF
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help