Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐น Robin Hood Hashing
Hash Tables, Open Addressing, Variance Reduction, Linear Probing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
110631
posts in
1.63
s
Cash machines
ripped
from Co-op in cherry
picker
ram-raid
the-independent.com
ยท
12h
๐ท๏ธ
Memory Tagging
Probation algorithm may be discriminatory, often
underestimates
chance of
reoffending
nltimes.nl
ยท
10h
๐
Miniselect
RUSTSEC-2025-0151
: Vulnerability in
sha-rst
rustsec.org
ยท
16h
๐
Rustls
Fidelity
Research
CS-2
a go-go ๐ซฃ
twogoodears.blogspot.com
ยท
10h
ยท
Discuss:
Blogger
๐
Naiad
A
crossbar
chip for benchmarking semiconductor spin
qubits
nature.com
ยท
12h
โ๏ธ
Quantum Computing
Functional
Optics
for Modern Java
blog.scottlogic.com
ยท
22h
๐ก๏ธ
Error Handling
CLBOSS
- Managing a Lightning Node Following
Austrian
Economics
insider.btcpp.dev
ยท
1d
โ๏ธ
LMAX Architecture
SSHStalker
Botnet Uses IRC
C2
to Control Linux Systems via Legacy Kernel Exploits
thehackernews.com
ยท
1d
๐
eBPF
Digital Footprint
walkthrough
(
TryHackMe
)
crystalcascade14.medium.com
ยท
1d
๐ท๏ธ
Memory Tagging
Stealerium
Unmasked
: Inside a Multi-Lure, Multi-Stage Stealer Campaign
levelblue.com
ยท
1d
๐
Hardware Security
Allocators
from C to
Zig
antonz.org
ยท
10h
ยท
Discuss:
Lobsters
,
Hacker News
๐๏ธ
Region-Based Memory
Orbit: Optimizing
Rescale
and
Bootstrap
Placement with Integer Linear Programming Techniques for Secure Inference
eprint.iacr.org
ยท
2d
๐ข
Homomorphic Encryption
Introduction
to
Forward-Error-Correcting
Coding
ntrs.nasa.gov
ยท
1d
๐๏ธ
Compression Formats
Building a
Regex
Engine with a team of parallel
Claudes
lesswrong.com
ยท
1d
๐ฑ
Nom
The Data
Broker
Directory
codamail.com
ยท
1h
ยท
Discuss:
Hacker News
๐
Digital Privacy
Invisible
Trails
? An Identity Alignment Scheme based on Online Tracking
arxiv.org
ยท
17h
๐
Fingerprinting
Helpful Skills or Hidden
Payloads
?
Bitdefender
Labs Dives Deep into the OpenClaw Malicious Skill Trap
bitdefender.com
ยท
9h
๐
Binary Exploitation
Isochronous
Fixed-Weight
Sampling
in Hardware
eprint.iacr.org
ยท
2d
๐ฒ
Hardware Branch Prediction
The
Immutable
Ledger
: Data Integrity Through TypeScript & Design Patterns
dev.to
ยท
2d
ยท
Discuss:
DEV
๐ณ
Merkle Trees
Show HN: A
segmentation
model client-side via
WASM
qtoolkit.dev
ยท
9h
ยท
Discuss:
Hacker News
๐ผ๏ธ
Halide
Loading...
Loading more...
« Page 6
โข
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help