๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒณ Archive Merkle Trees

Integrity Verification, Distributed Validation, Content Addressing, Tamper Detection

Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท3d
๐Ÿ”Cryptographic Archaeology
Discussing the Open Source, Open Threats? paper with Behzad and Ali
opensourcesecurity.ioยท1d
๐Ÿ”“Open Source Software
AI browsers could leave users penniless: A prompt injection warning
malwarebytes.comยท11h
๐Ÿš€Indie Hacking
vial-kb/vial-qmk
github.comยท3h
โŒจ๏ธMechanical Keyboards
Open Platform For Enterprise AI's GenAI Code Adds Guardrails, AMD EPYC Support
phoronix.comยท18h
๐Ÿ”“Open Source Software
Next-gen voice, video, and chat messaging using your domain name not your number
thunderbolt.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
The Lobster Programming Language
strlen.comยท9hยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.comยท1d
๐Ÿ”“Hacking
Why Some Companies Scale Effortlessly While Others Hit Walls
adia.substack.comยท4hยท
Discuss: Substack
๐Ÿ”ŒInterface Evolution
Sentiment-Aware Mean-Variance Portfolio Optimization for Cryptocurrencies
arxiv.orgยท1d
๐Ÿ”BitFunnel
๐Ÿ’ปMCP: Protocol as Product, Hype as Standard
dev.toยท14hยท
Discuss: DEV
๐ŸบProtocol Archaeology
LLM-Based Agents for Competitive Landscape Mapping in Drug Asset Due Diligence
arxiv.orgยท1d
๐Ÿ”Information Retrieval
Agri-Query: A Case Study on RAG vs. Long-Context LLMs for Cross-Lingual Technical Question Answering
arxiv.orgยท54m
โš™๏ธCompression Benchmarking
John Willis: The True North of DevOps and DevSecOps
devops.comยท13h
โ„๏ธNix Adoption
Interpretable Early Failure Detection via Machine Learning and Trace Checking-based Monitoring
arxiv.orgยท54m
๐Ÿ”งHardware Verification
Stability Optimization and Analysis of Energy Flow Networks versus Different Centrality Measurement
arxiv.orgยท54m
๐ŸคConsensus Algorithms
How Retrieval Algorithms Shape Better LLM Responses?
dev.toยท4hยท
Discuss: DEV
๐Ÿ”Information Retrieval
How Hackers Trick AI: The Hidden World of Prompt Injections and Jailbreaks
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign
securityaffairs.comยท20h
๐Ÿ“ŸTerminal Forensics
A Tie-breaking based Local Search Algorithm for Stable Matching Problems
arxiv.orgยท54m
๐ŸŒธBloom Variants
Loading...Loading more...
AboutBlogChangelogRoadmap