๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Announcing Library of Congress Leadership for the FADGI Still Image Working Group
blogs.loc.govยท1d
๐Ÿ“„Document Digitization
Claude Code's 19 cent Parser
blogger.comยท3d
๐Ÿ”งBinary Parsers
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท2d
โœ…Format Verification
Microsoft Refuses To Divulge Data Flows To Police Scotland
slashdot.orgยท2h
๐Ÿ”—Data Provenance
Show HN: BYO-database website analytics built for indie hackers
berrylog.appยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Tic-tac-toe meets Lean 4
ochagavia.nlยท1dยท
Discuss: Lobsters, Hacker News, r/programming
โš”๏ธLean Tactics
The Era of AI-Generated Ransomware Has Arrived
wired.comยท1d
๐Ÿฆ Malware Analysis
How AI stem separation alters the workflow of music producers
medium.comยท1hยท
Discuss: Hacker News
๐ŸŽนMIDI Archaeology
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท3d
๐Ÿ”Quantum Security
Novel Cationic Lipid Formulation Optimization via Multi-Modal Data Integration & HyperScore Evaluation
dev.toยท3hยท
Discuss: DEV
๐Ÿ“ฆMETS Packaging
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.orgยท2d
๐ŸŒณArchive Merkle Trees
How AI Retrieves Anatomical Structures Using Vector Databases
hackernoon.comยท1d
๐Ÿ—‚๏ธVector Search
Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication
arxiv.orgยท1d
๐ŸคSecure Multiparty
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Why Relying on LLMs for Code Can Be a Security Nightmare
blog.himanshuanand.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Dark Reading Confidential: A Guided Tour of Today's Dark Web
darkreading.comยท7h
๐ŸŽซKerberos History
Android Document Readers and Deception: Tracking the Latest Updates to Anatsa
zscaler.comยท2dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
CrowdStrike to Acquire Onum, Boost Falcon Next-Gen SIEM
darkreading.comยท1d
๐ŸšจIncident Response
How much do you trust your cloud? Hackers exploit weakness to target customers - here's what we know
techradar.comยท2d
๐Ÿ”“Hacking
From Go code to container image with Depot API
dev.toยท8hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Loading...Loading more...
AboutBlogChangelogRoadmap