Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74629
posts in
707.6
ms
DNA
could
rival
computer chips for future data storage
earth.com
·
3d
🔢
Homomorphic Encryption
Digital
Footprint
medium.com
·
1d
🔍
Digital Forensics
Practical Strategies for
Securing
Web
APIs
in Modern Applications
dev.to
·
12h
·
Discuss:
DEV
🔌
APIs
HBMHCW
Addresses $370 Million Q1 2026 Crypto Theft Crisis with Multi-Layer Phishing Defense as Attacks
Escalate
smb.bogalusadailynews.com
·
2d
🔒
Security
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🔒
Security
The P in
PGP
isn’t for pain:
encrypting
emails in the browser
ckardaris.github.io
·
3d
·
Discuss:
Hacker News
🔒
Rustls
Private Data Space Model
privatedata.space
·
4d
🔗
Intrusive Containers
We have
broken
SHA-1
in practice
shattered.io
·
2d
·
Discuss:
Hacker News
⚡
xxHash
DCP-o-matic • Re: How do I generate a
VF
using an encrypted
OV
DCP?
dcpomatic.com
·
2d
🛡️
AMD SEV
Microsoft Releases
Crescent
Cryptographic
Library
i-programmer.info
·
4d
🔒
Tetragon
Podcast
Spotlight
: The Threat from Quantum
Computers
assured.se
·
4d
⚛️
Quantum Computing
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
3d
·
Discuss:
Hacker News
#️⃣
Hash Tables
AI Can
Easily
Crack Your
Passwords
– Tips to Create Strong
Passwords
maketecheasier.com
·
3d
⚡
xxHash
ERC-8004
: A
Trustless
Agent Standard for On-Chain AI in Avalanche C-Chain
medium.com
·
1d
🗳️
Raft Consensus
AI
Watermark
&
Stego
Scanner (Text + Code)
ulrischa.github.io
·
2d
·
Discuss:
Hacker News
👆
Fingerprinting
Building a Secure Email Migration Tool:
OAuth
,
Encryption
, and Privacy by Design
dev.to
·
12h
·
Discuss:
DEV
🔒
Security
The end of "trust me
bro
" -
confidential
computing for everyone
stacker.news
·
4d
🔐
SGX Enclaves
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
4d
🔒
Security
Plato
's Form: Toward
Backdoor
Defense-as-a-Service for LLMs with Prototype Representations
arxiv.org
·
19h
🛡️
AMD SEV
Securing
Hardware
For The Quantum Era
semiengineering.com
·
4d
🔐
Hardware Security
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help