🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌳 Archive Merkle Trees

Integrity Verification, Distributed Validation, Content Addressing, Tamper Detection

A Wide Reduction Trick (2022)
words.filippo.io·8h·
Discuss: Lobsters, Hacker News
💧Liquid Types
Thought Purity: Defense Paradigm For Chain-of-Thought Attack
arxiv.org·7h
🛡️Proof-Carrying Archives
Checking data integrity
eclecticlight.co·1d
✅Checksum Validation
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
securelist.com·3h
🌐DNS Security
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.com·1d
🤝Consensus Algorithms
Detection Engineering: Practicing Detection-as-Code – Repository – Part 2
blog.nviso.eu·3h
🔄Reproducible Builds
A distributed systems reliability glossary
antithesis.com·1d·
Discuss: Lobsters, Hacker News, r/programming
✅Archive Fixity
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.com·21h
🔓Password Cracking
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.org·3d
🌐DNS Security
Zero Knowledge Proofs in DApp Development Essential Insights for Developers
dev.to·1h·
Discuss: DEV
🔐Homomorphic Encryption
Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any scale (preview)
aws.amazon.com·20h·
Discuss: Hacker News
🤖Network Automation
Crates.io Implements Trusted Publishing Support
socket.dev·15h·
Discuss: Hacker News
🦀Rust Verification
Security-Focused Homelab
reddit.com·9h·
Discuss: r/homelab
🏠HomeLab
Decrypting DPAPI Credentials Offline
infosecwriteups.com·6h
🕸️WebAssembly
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.space·1d
🔢Bitwise Algorithms
MCP: A Practical Security Blueprint for Developers
thenewstack.io·1d
🔓Hacking
Show HN: SilentArena – Learn ransomware behavior safely (C-based)
github.com·17m·
Discuss: Hacker News
🦠Malware Analysis
Building Production-Grade Network Telemetry: A gRPC Journey Into the Heart of Network Monitoring
dev.to·15h·
Discuss: DEV
📡Network Monitoring
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.com·1d
🏺ZIP Archaeology
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.com·2d
🧬Bitstream Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap