๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Audio Forensics

Sound Authentication, Voice Analysis, Acoustic Evidence, Digital Investigation

Marshall's first party speaker unsurprisingly looks like a guitar amp
engadget.comยท6h
๐ŸŽต8-track Revival
Claude Code's 19 cent Parser
blogger.comยท1d
๐Ÿ”งBinary Parsers
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
The history of digital ethics
arxiv.orgยท21h
โš–๏ธArchive Ethics
OCR Is Legacy Tech
cloudsquid.ioยท6hยท
Discuss: Hacker News
๐Ÿ‘๏ธOCR Evolution
Reloading classes in python and shared borders
andrewpwheeler.comยท14hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Why Is Everyone Buying Change Data Capture?
estuary.devยท6hยท
Discuss: Hacker News
๐ŸŒŠStream Processing
A Defect Classification Framework for AI-Based Software Systems (AI-ODC)
arxiv.orgยท21h
๐Ÿ‘๏ธSystem Observability
I open-sourced a protocol to create auditable logs for AI agents
medium.comยท11hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Spate of hoax calls about active shooters stir fear at college campuses around the US
apnews.comยท5hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
I Vibecoded my first app
apps.apple.comยท4hยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Meta raids Google DeepMind and Scale AI for its all-star superintelligence team
businessinsider.comยท16h
๐Ÿค–AI Curation
Google has a mountain of obstacles to overcome with its new Nest speaker, cameras and doorbell โ€“ and one of those is Amazon's budget-friendly Echo devices
techradar.comยท11h
๐Ÿ Home Automation
Sneaky swirls: 'Hidden' vortices could influence how soil and snow move
phys.orgยท16h
๐ŸบComputational Archaeology
Addressing the new executive threat: the rise of deepfakes
techradar.comยท18h
๐Ÿ›กCybersecurity
L-XAIDS: A LIME-based eXplainable AI framework for Intrusion Detection Systems
arxiv.orgยท21h
๐Ÿ”Vector Forensics
The coming war on general-purpose computing (2012)
boingboing.netยท11hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Responsible AI Inspector: Unmasking Bias in AI Systems
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Hook Android Trojan Now Delivers Ransomware-Style Attacks
darkreading.comยท8h
๐Ÿ”“Hacking
Analysis and Detection of RIS-based Spoofing in Integrated Sensing and Communication (ISAC)
arxiv.orgยท21h
โš–๏ธRISC-V Formal
Loading...Loading more...
AboutBlogChangelogRoadmap