🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptography

Encryption, Ciphers, Security, Hash Functions, Public Key

Cloisters and Ciphers: What Medieval Monks and the CIA Have in Common
crimereads.com·11h
🗣Linguistics
Structural vs. Mathematical “Under” (2023)
dyalog.com·1d·
Discuss: Lobsters, Hacker News, r/programming
⚙️Compilers
Decentralized Operating System
github.com·6h·
Discuss: r/opensource
💻Programming
Level Up Your Security Posture with the Auth0 Security Detection Catalog
auth0.com·2d
🌍Typology
Musings: Data poisoning
joshs.bearblog.dev·3h
💻Programming
FLINT: Fast Library for Number Theory
flintlib.org·2d
🔢Mathematical Puzzles
More on seed phrase words
johndcook.com·1d·
Discuss: Hacker News
🔢Mathematical Puzzles
Deep learning reveals antibiotics in the archaeal proteome
nature.com·6h·
Discuss: Hacker News
💻Programming
Phishing Emails Are Now Aimed at Users and AI
malwr-analysis.com·2d·
Discuss: Hacker News
🧩Puzzles
Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.com·22h
🔢Mathematical Puzzles
[Anthropic] A hacker used Claude Code to automate ransomware
lesswrong.com·6h
💻Programming
BW21-CBV-Kit——Home Video Monitoring and Playback System
hackster.io·15h
⚙️Compilers
Physical Access Control Raises New Security Concerns
semiengineering.com·14h
⚙️Compilers
Which is the stronger password? g72$l#pT9a or –.COW
ianmccloy.com·2d·
Discuss: Hacker News
🔢Mathematical Puzzles
Beyond the Checkbox: How Backblaze’s SOC 2 Type 2 Certification Secures Your Cloud Data
backblaze.com·6h
⚙️Compilers
Why Relying on LLMs for Code Can Be a Security Nightmare
blog.himanshuanand.com·6h·
Discuss: Hacker News
💻Programming
Salt Typhoon hacking campaign goes beyond previously disclosed targets, world cyber agencies say
cyberscoop.com·49m
🌍Typology
Crescent library brings privacy to digital identity systems
microsoft.com·1d
💻Programming
A Privacy Shield in the Wake of AT&T Data Breaches
puri.sm·1d
🔢Mathematical Puzzles
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.org·1d
🔢Mathematical Puzzles
Loading...Loading more...
AboutBlogChangelogRoadmap