๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

X1 Achieves Record Growth as Numerous Fortune 500 Companies Standardize on X1 Enterprise
blog.x1discovery.comยท6h
๐Ÿ”—Data Provenance
FOSS Weekly #25.31: Kernel 6.16, OpenMandriva Review, Conky Customization, System Monitoring and More
itsfoss.comยท18h
๐ŸงFOSS
The Attack Is Coming, Are We Actually Prepared?
optiv.comยท2d
๐ŸŽฏThreat Hunting
Is Sass Dead Yet? CSS Mixins & Functions &c
conffab.comยท7hยท
Discuss: Lobsters
๐Ÿ”—Concatenative Programming
From XML to JSON to CBOR
cborbook.comยท3dยท
Discuss: Lobsters, Hacker News, Hacker News, r/programming
๐Ÿ“‹Document Grammar
Until the End of the Internet
37signals.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
AI coding agent is a spy
unknwon.ioยท3dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
IT-Security : Gematik commissions EY with zero-trust implementation for TI 2.0
heise.deยท1d
๐Ÿ”คEBCDIC Privacy
Introducing Proton Authenticator โ€“ secure 2FA, your way
proton.meยท11hยท
Discuss: Hacker News
๐Ÿ›ก๏ธARM TrustZone
Polar Coding and Linear Decoding
arxiv.orgยท2d
โ„น๏ธInformation Theory
Machine Learning Fundamentals: k-nearest neighbors tutorial
dev.toยท1dยท
Discuss: DEV
๐Ÿง Machine Learning
PRISM: Programmatic Reasoning with Image Sequence Manipulation for LVLM Jailbreaking
arxiv.orgยท1d
๐Ÿ’ปLocal LLMs
Deep-Dive Reports on Leading Topics in AI and Digital Modernity
dev.toยท2dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
I Made AI Personas Watch (and React to) the Astronomer Ad
askrally.comยท2dยท
Discuss: Hacker News
๐Ÿ“ผCassette Hacking
Ambler: rules of engagement with coding agents
dev.toยท1hยท
Discuss: DEV
๐Ÿ’งLiquid Types
Bulletproof Go: Security Practices That Actually Work ๐Ÿ”
dev.toยท6dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Re: Multiple vulnerabilities in the web management interface of Intelbras routers
seclists.orgยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Scaling with Redis Sharding in Go: A Practical Guide with Hashing Strategies
dev.toยท13hยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Sharding
A Hitchhiker's Guide to the AI Bubble
fluxus.ioยท1hยท
Discuss: Hacker News
๐Ÿง Intelligence Compression
How AI resurrected an unsolved security problem โ€” data sprawl
techradar.comยท3d
๐Ÿ”—Data Provenance
Loading...Loading more...
AboutBlogChangelogRoadmap