๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Federal data more at risk, a report from American Statistical Association
flowingdata.comยท9h
๐Ÿ“œFamily History Data
DeltaCompare 17.0.0 Release: Introducing Multithreading
deltaxignia.comยท1d
โ–ณDelta Compression
Preservica Academy Celebrates Milestone Success in Advancing Digital Preservation Skills
preservica.comยท2d
๐Ÿ›๏ธPreservation Standards
AI Puts Your Personal Privacy at Risk
puri.smยท2d
๐Ÿ”’Privacy Archives
Symbolic-numeric programming in scientific computing
dspace.mit.eduยท2d
๐ŸงฌFunctional Programming
Show HN: Compress Image โ€“ Simple Lossless and Lossy Image Compression Tool
compressimagex.comยท8hยท
Discuss: Hacker News
๐Ÿ“ธPNG Optimization
CVE-2025-43253: Bypassing Launch Constraints on macOS
wts.devยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธCLI Security
Vibe coding platform allowed access to private apps
wiz.ioยท3dยท
Discuss: Hacker News, Hacker News
๐Ÿ›ก๏ธARM TrustZone
Guarding the herd โ€“ managing database servers at scale
engineering.monday.comยท2dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
This web framework was built by Claude
rgk.ioยท45mยท
Discuss: Hacker News
๐ŸŒณIncremental Parsing
Bazzite OS
reddit.comยท18hยท
Discuss: r/homelab
๐Ÿ”ŒOperating system internals
IEPG at IETF 123
blog.apnic.netยท15h
๐Ÿ“กNetwork Protocol Design
I built a free, open-source security scanner with shareable dashboards
github.comยท9hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Why Iโ€™m Betting on UTCP as a Serious Alternative to MCP
dev.toยท6hยท
Discuss: DEV
๐ŸŒNetworkProtocols
RestoreAI - Pattern-based Risk Estimation Of Remaining Explosives
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Attackers actively exploit critical zero-day in Alone WordPress Theme
securityaffairs.comยท1d
๐Ÿ”“Hacking
What the Coinbase Breach Says About Insider Risk
darkreading.comยท1d
๐Ÿ”“Hacking
Hierarchical Graph Neural Network for Compressed Speech Steganalysis
arxiv.orgยท2d
๐Ÿง Learned Codecs
Comparing Cluster-Based Cross-Validation Strategies for Machine Learning Model Evaluation
arxiv.orgยท1d
๐Ÿง Machine Learning
How the FBI got everything it wanted (re-air) (Lock and Code S06E15)
malwarebytes.comยท3d
๐Ÿ•ณ๏ธInformation Leakage
Loading...Loading more...
AboutBlogChangelogRoadmap