🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”— Archive Combinators

Preservation Composition, Storage Abstractions, Format Pipelines, Data Transformations

β€œ$ Unearthing Digital Ghosts: How Deleted GitHub Files Can Make Your Bug Bounty Fortune”
infosecwriteups.comΒ·1h
🏺ZIP Archaeology
Cryptography for the Everyday Developer: Understanding DES - The Data Encryption Standard
sookocheff.comΒ·23h
πŸ”Cryptographic Archaeology
Need help with Software solution and checking if I made a mistake or oversight in my build
reddit.comΒ·2hΒ·
Discuss: r/homelab
πŸ”ŒOperating system internals
I got tired of explaining my project to AI assistant so I gave it memory
codecontextpro.comΒ·1dΒ·
Discuss: Hacker News
🌳Incremental Parsing
Quicksilver v2: evolution of a globally distributed key-value store (Part 2)
blog.cloudflare.comΒ·2dΒ·
Discuss: Hacker News
πŸ”„Sync Engine
A Β£3.93/mo Nomad‑backed learning lab: Next.js Β· .NET Β· Postgres on a budget
craig.banach.devΒ·1dΒ·
Discuss: Hacker News, r/selfhosted
πŸ–₯️Self-hosted Infrastructure
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.orgΒ·2d
πŸ”Quantum Security
MCP: Bringing mashups back!
blog.pamelafox.orgΒ·1dΒ·
Discuss: www.blogger.com, Hacker News
πŸ”ŒInterface Evolution
Manus AI agent context engineering – practical implementation guide
aicodingtools.blogΒ·8hΒ·
Discuss: Hacker News
⚑Incremental Computation
Matt Dillon discusses the past, present and future of BSDs (2022)
web.archive.orgΒ·18hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
From Paper to Proof: How We Can Formally Verify Blockchain Protocols with Lean4
medium.comΒ·2dΒ·
Discuss: Hacker News
🀝Distributed Consensus
Advanced PDF Optimization Techniques - 1752914
dev.toΒ·5hΒ·
Discuss: DEV
πŸ“Text Compression
This Should Not Be Possible
ghuntley.comΒ·12hΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Security
Machine Learning Fundamentals: dropout
dev.toΒ·1dΒ·
Discuss: DEV
🌊Stream Processing
Dual-Numbers Reverse AD for Functional Array Languages
arxiv.orgΒ·1d
πŸ“ŠAPL Heritage
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”’WASM Capabilities
Getting past LLM "day one" problem with MIRIX
fujimon.comΒ·1dΒ·
Discuss: Hacker News
πŸ’ΎPersistence Strategies
Proof-theoretic Semantics for First-order Logic
arxiv.orgΒ·1d
πŸ—οΈConstructive Logic
Post-Quantum Cryptography in Kubernetes
kubernetes.ioΒ·1d
πŸ”Quantum Security
Enabling Rapid Genomic Analysis with Illumina Dragen on Amazon EC2 F2 Instances
aws.amazon.comΒ·3dΒ·
Discuss: Hacker News
βš™οΈCompression Benchmarking
Loading...Loading more...
AboutBlogChangelogRoadmap