Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏹 Robin Hood Hashing
Hash Tables, Open Addressing, Variance Reduction, Linear Probing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
110777
posts in
1.84
s
The hidden risks of the
Homebrew
Cellar
in Vulnerability Management
the-sequence.com
·
4h
🔒
BPF LSM
AI and
IP
Infringement
: Why Detection Is Becoming a Race Against Time
circleid.com
·
31m
🛡️
AI Security
Introducing GPT‑5.3‑
Codex
‑
Spark
simonwillison.net
·
51m
🎯
Lance
Compliments
to PG and
Secureblue
discuss.privacyguides.net
·
1d
🔐
Hardware Security
AI
Inference
Needs A
Mix-And-Match
Memory Strategy
semiengineering.com
·
14h
🌊
Memory Bandwidth
🎲 Migrating from Plausible to
Pirsch
Analytics using
Netlify
Edge Functions
markus-haack.com
·
9h
📦
Folly
Show HN: The
Algorithm
's Favorite Child
chatbotkit.com
·
6h
·
Discuss:
Hacker News
⚓
Anchors
sshca
: tool to manage SSH CA
certificates
doc.liw.fi
·
13h
🔐
Capability Systems
remote
locks
and
distributed
locks
tautik.me
·
1d
🔒
Two-Phase Locking
Round-Optimal Identity-Based Blind Signature from
Lattice
Assumptions
eprint.iacr.org
·
1d
👆
Fingerprinting
Critical
BeyondTrust
RCE
flaw now exploited in attacks, patch now
bleepingcomputer.com
·
32m
🔐
Hardware Security
Show HN: A
deterministic
adversarial
puzzle system
hashclue.com
·
3h
·
Discuss:
Hacker News
🛡️
AI Security
AI-Assisted Web and Cloud Penetration Testing with Cursor + MCP
HexStrike
and
Burp
Suite MCP.
infosecwriteups.com
·
16h
🛡️
AI Security
Building Hybrid Search for RAG: Combining
pgvector
and Full-Text Search with
Reciprocal
Rank Fusion
dev.to
·
17h
·
Discuss:
DEV
🎯
Qdrant
AI Apps Have a New Attack Surface:
External
Inputs
hackernoon.com
·
15h
🛡️
AI Security
Mask-Based
Window-Level
Insider Threat Detection for Campaign Discovery
arxiv.org
·
17h
📱
Edge AI
Paper: Prompt Optimization Makes
Misalignment
Legible
lesswrong.com
·
2h
💬
Prompt Engineering
Fully Countering
Trusting
Trust through Diverse Double-Compiling (
DDC
) - Countering Trojan Horse attacks on Compilers
dwheeler.com
·
1d
💼
Thrift
The
OWASP
LLM Top: A Practical Attack Guide (with 122 real attack
techniques
)
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
🛡️
AI Security
$\phi(n)$-evaluation algorithm: a novel approach for an efficient retrieval of Euler's
totient
of an RSA
Modulus
eprint.iacr.org
·
2d
#️⃣
Perfect Hashing
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help