🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌳 Archive Merkle Trees

Integrity Verification, Distributed Validation, Content Addressing, Tamper Detection

Seven Years of Thulium
ionathan.ch·2d
🏠Homelab Federation
Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security
blackhillsinfosec.com·3d
🔓LDAP Injection
Encoding sortable binary database keys
stately.cloud·4d·
Discuss: Hacker News
💾Database Formats
Lessons from a Laundry-Folding Robot
joannastern.beehiiv.com·8h·
Discuss: Hacker News
🧮Algorithmic Cooking
Chat Control Proposal Advances Despite Rising Opposition in Europe
circleid.com·8h
⚖️Legal Compliance
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·5d·
Discuss: Hacker News
🔐Archive Encryption
Thoughts on Vibe Coding from a 40-year veteran
levelup.gitconnected.com·2d
🏗️Compiler Archaeology
5 Books Scientific American Recommends for August
scientificamerican.com·12h
📚MARC Evolution
Are OpenAI and Anthropic Losing Money on Inference?
martinalderson.com·2d·
Discuss: Hacker News
🌊Streaming Algorithms
Release Speakeasy OpenAPI: Go Library & CLI for OpenAPI and Arazzo
reddit.com·1d·
Discuss: r/golang
🔌Interface Evolution
Replacing Developers with GPUs
ayende.com·1d·
Discuss: Hacker News
📏Code Metrics
Oh goody, the 'first known AI-powered ransomware' has been discovered and it 'may exfiltrate data, encrypt it, or potentially destroy it'
pcgamer.com·3d·
Discuss: Hacker News, r/technews
🔓Hacking
How we built the most efficient inference engine for Cloudflare’s network
blog.cloudflare.com·3d·
Discuss: Hacker News
🌊Stream Processing
Kubernetes v1.34: Of Wind & Will (O' WaW)
kubernetes.io·3d·
Discuss: Hacker News
📦Container Security
Using Agents for Business Development
dev.to·1d·
Discuss: DEV
⚡Proof Automation
Show HN: I created redux-lite: easy-use, high-performance React state manager
github.com·23h·
Discuss: Hacker News
🧩WASM Components
China Hijacks Captive Portals to Spy on Asian Diplomats
darkreading.com·3d
🔓Hacking
Dark Reading Confidential: A Guided Tour of Today's Dark Web
darkreading.com·2d
🎫Kerberos History
Practical Physical Layer Authentication for Mobile Scenarios Using a Synthetic Dataset Enhanced Deep Learning Approach
arxiv.org·1d
🧠Machine Learning
Antonio Cuni: EuroPython 2010 report
antocuni.eu·1d
🌐Protocol Synthesis
Loading...Loading more...
AboutBlogChangelogRoadmap