Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cryptography
Encryption, Hash Functions, Public Key, Digital Signatures
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112908
posts in
742.1
ms
Twenty
years of the Chip and Pin: How the way we pay has
evolved
the-independent.com
·
13h
🔐
Cybersecurity
Linux 7.0 Lands
ML-DSA
Quantum-Resistant
Signature Support
phoronix.com
·
21h
·
Discuss:
r/linux
🐧
Linux
sshca
: tool to manage SSH CA
certificates
doc.liw.fi
·
2d
🔑
SSH
Don't pass on small block
ciphers
00f.net
·
4d
🔒
TLS/SSL
Demystifying JOSE, the JWT Family: JWS, JWE,
JWA
, and
JWK
Explained
auth0.com
·
2d
🔒
TLS/SSL
Hiding
information inside images
nullonerror.org
·
1d
·
Discuss:
Hacker News
🔐
Cybersecurity
Vault
certificates
and secrets inventory reporting: Improve visibility and audit
readiness
hashicorp.com
·
20h
🎯
Penetration Testing
Bitcoin
Hackathon
2026 at MIT | 36-Hour
Hackathon
in
Boston
mitbitcoinexpo.org
·
21h
🦈
Wireshark
Digital Theory -- now
published
cultureandcommunication.org
·
16h
🌐
Networking
The $17 Billion Wake-Up Call:
Securing
Crypto in the Age of AI
Scams
hackread.com
·
1d
🎯
Penetration Testing
An offline
encrypted
vault
for iOS
securestorage.app
·
1d
·
Discuss:
Hacker News
🔒
TLS/SSL
Degree
ABCs
mcgill.ca
·
21h
🦠
Malware Analysis
Optimized Implementations of
Keccak
, Kyber, and
Dilithium
on the MSP430 Microcontroller
eprint.iacr.org
·
2d
🔐
Cybersecurity
Programming
languages
mothcodes.bearblog.dev
·
1d
💻
Computer Science
Code Is
Poetry
ta.fo
·
15h
🐍
Python
Quantum research in two ways: From
proving
someone's location to
simulating
financial markets
phys.org
·
13h
💻
Computer Science
Contributing to Lightning Network: Building a Secure
Preimage
RPC for
LND
dev.to
·
7h
·
Discuss:
DEV
🔒
TLS/SSL
A
Bright
Future Beyond
Sunsetting
Platforms: Taking Control of Your Identity Journey
guidepointsecurity.com
·
21h
🔬
Reverse Engineering
NBDE
(Network-Bound
Disk
Encryption) Technology
access.redhat.com
·
2d
🧱
Firewalls
Goutham
Reddy
: Row-level and Column-level Security
postgr.es
·
1d
🧱
Firewalls
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help