🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌳 Archive Merkle Trees

Integrity Verification, Distributed Validation, Content Addressing, Tamper Detection

Diving deep into Binius M3 arithmetization using Merkle tree inclusion as an example
blog.lambdaclass.com·1d
🔗Hash Chains
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·7h
📋Protocol Buffers
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·2h
🦠Malware Analysis
Show HN: Cartesian vs. Sparse Merkle Trees – faster treap-based design in Go
rafaelescrich.medium.com·5d·
Discuss: Hacker News
🔗Hash Chains
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·5h
🎫Kerberos Attacks
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.com·18m
🤖Network Automation
Program Execution, follow-up
windowsir.blogspot.com·2h·
Discuss: www.blogger.com
⚡Performance Tools
Fixes for five Lix CVEs
lix.systems·23h·
Discuss: Lobsters
❄️Nix Adoption
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·17h
🔗Data Provenance
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·6h
🔓Hacking
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.ch·5h
🗃️Database Storage
Encrypting identifiers in practice
sjoerdlangkemper.nl·9h
🌊Stream Ciphers
How to (Almost) solve cybersecurity once and for all
adaptive.live·18h·
Discuss: Hacker News
🔐Systems Hardening
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
seclists.org·1d
🛡Cybersecurity
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·23h
🛡️eBPF Security
Confidential Wrapped Ethereum
ethresear.ch·1d·
Discuss: Hacker News
🔗Hash Chains
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·1d
🔐Quantum Security
Critical Security Importance Digital Age Web Techniques(1750818928214500)
dev.to·12h·
Discuss: DEV
🔒WASM Capabilities
The Case for Native Iceberg Catalog APIs and Unified Governance in Object Storage
blog.min.io·1d
🏷️Metadata Standards
Loading...Loading more...
AboutBlogChangelogRoadmap