Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74662
posts in
1.20
s
How I Built a Random Number
Generator
(
Sort
Of)
dev.to
·
2d
·
Discuss:
DEV
🐛
Fuzzing
ZeroShadow
1.0
majorgeeks.com
·
5d
📄
FlatBuffers
PCI
DSS
4.0.1 compliance with
HashiCorp
Vault and Vault Radar
hashicorp.com
·
6d
🔒
Security
Examining
black-box forensic tools in digital vehicle
forensics
: Capabilities, limitations, and practical implications
sciencedirect.com
·
6d
🔍
Digital Forensics
Unhackable
metasurface
holograms
: Security technology can lock information with light color and distance
techxplore.com
·
6d
🔒
Digital Privacy
Modern IoT: Controlling Devices via LINE Bot,
MQTT
, and
Serverless
(2026 Edition)
dev.to
·
3d
·
Discuss:
DEV
📡
MQTT
Super speed, super quality: lessons from the
Aptos
Network site launch—Martian Chronicles, Evil
Martians
’ team blog
evilmartians.com
·
6d
⚡
LMAX Disruptor
Digital
signatures
with
classical
shadows on near-term quantum computers
arxiv.org
·
4d
⚛️
Quantum Computing
Quantum Key Distribution with
Imperfections
: Recent Advances in Security
Proofs
arxiv.org
·
3d
⚛️
Quantum Computing
I made my own encrypted
tunnels
with
NodePass
because I don't trust Cloudflare
xda-developers.com
·
6d
🦀
Pingora
rcrowley/certified
: Generate and manage an internal CA for your company
github.com
·
3d
🔑
Kanidm
Simple
vanilla
restaurant
booking
system
vanillife.substack.com
·
5d
·
Discuss:
Substack
🐘
PostgreSQL Internals
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
5d
🔒
Security
**Abstract:** The increasing
proliferation
of genetic data presents unprecedented opportunities for medical advancements, yet
simultaneously
raises critical ...
freederia.com
·
4d
🔢
Homomorphic Encryption
RP2350
Hacking Challenge 2: Less
randomisation
, more correlation
raspberrypi.com
·
6d
·
Discuss:
Hacker News
🔐
Hardware Security
Digital ID done right:
verifiable
claims without the
surveillance
willhackett.uk
·
6d
·
Discuss:
Hacker News
🔑
Kanidm
Efficient Bayesian
Sieve
Modeling for Predicting Twin Prime Density in Large Numerical Ranges **Abstract** The distribution of twin
primes
—pairs of
primes
se...
freederia.com
·
3d
📊
HyperLogLog
Cryptanalytic
Extraction of Neural Networks with Various
Activation
Functions
eprint.iacr.org
·
6d
🛡️
AI Security
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
5d
·
Discuss:
DEV
🔒
Security
A Quick Look at
QUIC
potaroo.net
·
6d
·
Discuss:
Hacker News
⚡
QUIC Protocol
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help