🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌳 Archive Merkle Trees

Integrity Verification, Distributed Validation, Content Addressing, Tamper Detection

Gold, Silver, and Bronze Coins
blog.tanyakhovanova.com·3h
🔐Cryptographic Archaeology
Security Chat 6.0: A Night of Ideas, Innovation, and Community in Zurich
raffy.ch·5h
🎯Threat Hunting
The 3D Software Rendering Technology of 1998's Thief: The Dark Project (2011)
nothings.org·43m·
Discuss: Hacker News
📟Terminal Physics
Deep learning reveals antibiotics in the archaeal proteome
nature.com·4h·
Discuss: Hacker News
⚙️ABNF Mining
SuperNICs Explained and Compared to DPUs
technetbooks.com·1d·
Discuss: Hacker News
⚡Compression Hardware
Deep dive into Mojo object initialization
connorgray.com·1h·
Discuss: Hacker News
🦀Rust Borrowing
Show HN: Vanitycert.com – Automated Custom Domains and SSL for SaaS
vanitycert.com·3h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Building an Ergonomic OpenTelemetry for JavaScript
thenewstack.io·4h
🐚Nordic Shell
AI Agents Need Data Integrity
schneier.com·5d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Vibe Coding Doesn't Replace Tech Skills; It Requires More of Them
pawelbrodzinski.substack.com·5h·
Discuss: Substack
📏Code Metrics
What Happens When You Sign a Crypto Transaction (And What Could Go Wrong)
hackernoon.com·2d
🔗Hash Chains
Creating Wikipedia Search Embeddings with a Gaia Node
dev.to·1d·
Discuss: DEV
🏛Wikidata
Go Coding with Asparagos: The Smartest Peanut in the Neighborhood
dev.to·1d·
Discuss: DEV
💾Binary codes
AWS Kiro: Arbitrary Code Execution via Indirect Prompt Injection
embracethered.com·1d
🛡️CLI Security
HAEPO: History-Aggregated Exploratory Policy Optimization
arxiv.org·14h
🧠Machine Learning
What a difference 2 years makes: MariaDB buys back SkySQL
theregister.com·6h·
Discuss: Hacker News
🗄️Database Internals
Build a baby Claude Code using Python
siddharthbharath.com·2d·
Discuss: Hacker News
⚡Proof Automation
The Art & Science of Crypto Market Making: Inside Kairon Labs
hackernoon.com·11h
🔗Hash Chains
aria - Event Driven websocket framework
dev.to·12h·
Discuss: DEV
🔌Interface Evolution
Lightning Talk: Confidential VMs in Kubevirt: Securing VMs With Kube... Basavaraju G & Rishika Kedia
youtube.com·21h
📦Container Security
Loading...Loading more...
AboutBlogChangelogRoadmap