🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌳 Archive Merkle Trees

Integrity Verification, Distributed Validation, Content Addressing, Tamper Detection

# How I Built a Fully Decentralized On-Chain Game with 0 Lines of Code, Thanks to Gemini
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”—Hash Chains
Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign
securityaffairs.comΒ·1h
🎫Kerberos Attacks
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comΒ·1d
πŸ›‘οΈCLI Security
Graphzep -TypeScript implementation of temporal knowledge graph memory system
github.comΒ·11hΒ·
Discuss: Hacker News
πŸ•ΈοΈNeo4j
Micropycelium - prototype routable mesh network for ESP32
hackster.ioΒ·23h
πŸ•ΈοΈMesh Networking
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comΒ·20h
πŸ”“Hacking
Get Back To WARP
binary.ninjaΒ·15h
πŸ§ͺBinary Fuzzing
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comΒ·19h
πŸ”“Hacking
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·17h
πŸ”Cryptographic Archaeology
AI Agents Need Data Integrity
schneier.comΒ·22hΒ·
Discuss: www.schneier.com
πŸ›‘οΈPreservation Proofs
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.toΒ·20hΒ·
Discuss: DEV
βœ…Checksum Validation
Bringing restartable sequences out of the niche
lwn.netΒ·1dΒ·
Discuss: Hacker News
πŸ”©Systems Programming
Changelog: Determinate now has a nix-darwin module, plus loads of performance perks
determinate.systemsΒ·1d
❄️Nix Adoption
Saleae Analyzer for the BDM protocol
zetier.comΒ·2d
πŸ”¬Binary Analysis
Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·17hΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Desync the Planet – Rsync Remote Code Execution
phrack.orgΒ·4dΒ·
Discuss: Lobsters
πŸ“¦Content Addressing
My A-Z toolbox: dcfldd
rubenerd.comΒ·9h
πŸ“‹DFDL
Can AI weaponize new CVEs in under 15 minutes?
valmarelox.substack.comΒ·1dΒ·
Discuss: Substack
πŸ§ͺProtocol Fuzzing
The Growing Challenge of AI Agent and NHI Management
darkreading.comΒ·19h
πŸ”“Hacking
Multiple Memory Systems for Enhancing the Long-term Memory of Agent
arxiv.orgΒ·1d
πŸ“ΌTape Combinators
Loading...Loading more...
AboutBlogChangelogRoadmap