Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Deterrence
nuclear deterrence, MAD, second strike, extended deterrence
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7141
posts in
17.7
ms
Coherent
Rollout
Oracles
for Finite-Horizon Sequential Decision Problems
🪄
Prompt Engineering
arxiv.org
·
20h
The
Silencing
Engine
🛡️
Content Moderation
kitchencloset.com
·
6d
·
Hacker News
,
r/artificial
hsaghir/looplet
: The tool-calling loop for LLM agents; iterator-first, protocol-hooked, one dependency.
🔧
Agent Tooling
github.com
·
1d
·
Hacker News
Show HN: A small
hook
to prevent agents from
destructive
things
💻
CLI Tools
gist.github.com
·
3d
·
Hacker News
A Control Framework for Induced
Seismicity
Mitigation in
Groningen
Gas Reservoir
🔍
AI Interpretability
arxiv.org
·
20h
Iran didn’t have a nuclear
weapon
before this war. But you can see why it would want one now
☢️
Non-Proliferation
theguardian.com
·
4d
US Navy tests laser weapon that shoots down drones on the USS George H.W. Bush
supercarrier
— ‘system tracked, engaged, and
neutralized
multiple target drones,’ has essentially unlimited power source
⚔️
Cyber Warfare
tomshardware.com
·
5d
·
Hacker News
Last
Rounds
? Status of Key
Munitions
at the Iran War Ceasefire
☢️
Arms Control
csis.org
·
5d
·
Hacker News
Designing escalation
criteria
for international AI incident response:
criteria
, triggers, and
thresholds
⚖️
AI Governance
arxiv.org
·
2d
The West
forgot
how to make things, now it’s
forgetting
how to code
⏳
Tech History
conduit.arewefriends.org
·
4d
·
Hacker News
Monthly
Roundup
#41: April 2025
♟️
Game Theory
thezvi.substack.com
·
6d
·
Substack
How Big a Threat Are
Iranian-Backed
Cyberattacks
?
⚔️
Cyber Warfare
newyorker.com
·
6d
·
Hacker News
Structural Limits of Soft Fusion in
Multi-Warden
Covert
Communication
🔐
Cryptography
arxiv.org
·
2d
AI-Native Autonomous Infrastructure (
ANAI
): A
Formal
Framework for the Next General-Purpose Technology
🔍
AI Interpretability
arxiv.org
·
2d
ARCANE
: Cross-Campaign Attacker Re-identification via Passive Beacon
Telemetry
-- A Bayesian Network Framework for Longitudinal Cyber Attribution
🕵️
Threat Intelligence
arxiv.org
·
2d
When Corrective Hints Hurt: Prompt Design in Reasoner-Guided Repair of LLM
Overcaution
on
Entailed
Negations under OWL~2~DL
💭
Reasoning Models
arxiv.org
·
2d
Asymmetric-Information Resource Allocation Games: An LP Approach to
Purposeful
Deception
♟️
Game Theory
arxiv.org
·
1d
When Does LLM Self-Correction Help? A
Control-Theoretic
Markov
Diagnostic and Verify-First Intervention
🪄
Prompt Engineering
arxiv.org
·
3d
PermaFrost-Attack
: Stealth Pretraining Seeding(
SPS
) for planting Logic Landmines During LLM Training
🕳
LLM Vulnerabilities
arxiv.org
·
3d
Resilience Revisited: A
Multidimensional
Framework
Derived
from Realistic Attack Scenarios
🛡️
AI Security
arxiv.org
·
6d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help