🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Archive Encryption

Long-term Cryptography, Key Management, Preservation Security, Data Protection

What about 1392?
earth.hoyd.netΒ·16h
πŸ“ŠAPL Heritage
Phishing in the Cloud: SendGrid Campaign Exploits Account Security
cofense.comΒ·2d
πŸ›‘Cybersecurity
Nitro: A tiny but flexible init system and process supervisor
git.vuxu.orgΒ·18hΒ·
Discuss: Lobsters, Hacker News
πŸ”ŒOperating system internals
National Guard members on DC streets for Trump's crackdown will soon be armed, military says
the-independent.comΒ·22h
πŸ›‘Cybersecurity
Using LLMs to turn scripts into applications
djharper.devΒ·3dΒ·
Discuss: Hacker News
πŸ”„Language Evolution
80 Gb/s: New variant of fast OWC housing for M.2 SSDs
heise.deΒ·1d
πŸ”ŒOperating system internals
SparkKitty Malware Sneaks into Trusted Mobile Apps to Harvest Sensitive Photos
zimperium.comΒ·1d
πŸ§ͺArchive Fuzzing
Saturday Citations: Beyond general relativity; gas giants and dark energy; the pleasures of difficult hobbies
phys.orgΒ·1h
🌑️Preservation Physics
A Process to Trick ChatGPT into Agency
news.ycombinator.comΒ·16hΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
Regis Resources Limited (RGRNF) FY 2025 Earnings Call Transcript
seekingalpha.comΒ·1d
πŸ“‹PREMIS Events
5 Best Crypto Presales of 2025: Why BlockchainFX Is Set to Outshine Them All
hackernoon.comΒ·2d
πŸ”—Hash Chains
Grepcidr3: High performance search for IP addresses and CIDR ranges
github.comΒ·3dΒ·
Discuss: Hacker News
🌳Incremental Parsing
Benchmarking Computer Science Survey Generation
arxiv.orgΒ·1d
βš™οΈCompression Benchmarking
Automated Optimization of Brine Fracture Propagation Using Multi-Modal Data Fusion and Bayesian Hyperparameter Calibration
dev.toΒ·20hΒ·
Discuss: DEV
🏺Computational Archaeology
Why I Treat My Git Commits Like a Personal Journal
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Delta Encoding
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
arxiv.orgΒ·5d
πŸ”Homomorphic Encryption
Ella box - The box you can hack!
hackster.ioΒ·3d
πŸ“ŸTerminal Physics
The Unseen Battleground: An Architect’s Retro on Streaming 1 Billion Minutes of Live Sports
hackernoon.comΒ·3d
🌊Streaming Systems
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
darkreading.comΒ·3d
πŸ”“Hacking
AI in Custom Software Development: Understanding Transformation of Coding, Testing and Launch
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Code Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap