Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Security, Hashing, Public Key Infrastructure
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81097
posts in
915.1
ms
Main
Content ||
Math
∩ Programming
jeremykun.com
·
9h
📊
Algorithms
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
2h
⚡
FastAPI
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
9h
·
Discuss:
Hacker News
🌍
Distributed Systems
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
23h
🔒
Network Security
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
1d
·
Discuss:
DEV
⛓️
Blockchain
Home
eventhorizonarchitecture.org
·
11h
🏠
Self-hosting
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
📁
File Systems
Who
stays
connected
when the first systems fail? - opinion
jpost.com
·
21m
🏗️
System Design
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
3d
🏠
Self-hosting
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
13h
·
Discuss:
Hacker News
📜
Ansible
Nobody
knows
how the whole system works
surfingcomplexity.blog
·
7h
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
💬
Prompt Engineering
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
3d
⚙️
CPU Microarchitecture
ByteDance
Seed
seed.bytedance.com
·
22m
🦙
Ollama
Networking
Fundamentals
dev.to
·
19h
·
Discuss:
DEV
📡
Protocol Design
security center at university of Washington
secure-center.org
·
1d
🔒
Network Security
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
35m
·
Discuss:
Substack
📡
Protocol Design
hanig/engram
: Personal knowledge graph and automation system
github.com
·
1d
🦙
Ollama
Private Data Space Model
privatedata.space
·
4d
🔗
Parser Combinators
Performance Tip of the Week #83:
Reducing
memory
indirections
abseil.io
·
1d
🏗
Computer Architecture
Elongme
leibal.com
·
17h
🦙
Ollama
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help