Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81225
posts in
250.4
ms
Privacy-Preserving
Covert
Communication Using Encrypted Wearable
Gesture
Recognition
arxiv.org
·
13h
⚗️
Elixir
Language
Modeling
and Understanding Through
Paraphrase
Generation and Detection
arxiv.org
·
13h
🧩
Category Theory
How does information
flow
?
thewaiterspad.com
·
1d
🧩
Category Theory
Scientists Send Secure Quantum Keys Over 62 Miles of
Fiber
—Without
Trusted
Devices
singularityhub.com
·
20h
·
Discuss:
Hacker News
⚗️
Elixir
Hackers Use Signal
QR
Codes to
Spy
on Military and Political Leaders
hackread.com
·
1d
🦀
Rust
Sneaky
quokka
: Testing and debugging with LLMs
honnibal.dev
·
9h
⚗️
Elixir
Using Claude Code as a general agent
raahelbaig.com
·
1d
·
Discuss:
Hacker News
⚗️
Elixir
Show HN:
Kore
– Stack based language where
compiler
is the reward function
github.com
·
14h
·
Discuss:
Hacker News
⚗️
Elixir
gharasathi
(
घर
ासाठी) — A Privacy-First Household AI Running on a $200 Mini PC
amazon.com.au
·
2d
·
Discuss:
DEV
🧩
Category Theory
Well-Typed.Com
:
hs-bindgen
0.1-alpha release
well-typed.com
·
18h
·
Discuss:
Lobsters
,
Hacker News
🦀
Rust
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
3d
·
Discuss:
Hacker News
⚗️
Elixir
Pluribus
unwinnable.com
·
1d
🧩
Category Theory
Autocrypt
v2 - Post-Quantum and Reliable
Deletion
for Internet Messaging
autocrypt2.org
·
3d
⚗️
Elixir
A
Proof
of P =
NP
dev.to
·
1d
·
Discuss:
DEV
🧩
Category Theory
Identity Access Management:
pillar
of security and
compliance
clever.cloud
·
1d
🧩
Category Theory
Sympathy
for the Model, or,
Welfare
Concerns as Takeover Risk
lesswrong.com
·
1d
🦀
Rust
the
mathematics
of
compression
in database systems
bitsxpages.com
·
23h
·
Discuss:
Hacker News
🧩
Category Theory
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
1d
·
Discuss:
Hacker News
🦀
Rust
IEEVis
submission
template
notes.billmill.org
·
1d
⚗️
Elixir
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
·
1d
·
Discuss:
Hacker News
🧩
Category Theory
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help