🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ›£οΈ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

620: Postmortem for jemalloc
bsdnow.tvΒ·9h
πŸ“°RSS Archaeology
sanguichitos!
kivikakk.eeΒ·1d
πŸ“‘RSS Automation
Horus 64B: What does ALSA audio have to do with high altitude balloons???
sprocketfox.ioΒ·1d
βš™οΈCassette Mechanics
Show HN: TrueSift – AI-Powered Real-Time Fact-Checking Chrome Extension
truesift.devΒ·1hΒ·
Discuss: Hacker News
βœ…FLAC Verification
My husband and I spent nearly 3 months traveling in Europe. Avoiding these 8 mistakes would've saved us time and money.
businessinsider.comΒ·5h
⭐Awesome lists
The High Stakes of Biometric Surveillance
techpolicy.pressΒ·1dΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Billions of Edges per Second with Postgres
onesparse.comΒ·2dΒ·
Discuss: Hacker News
πŸ—œοΈGraph Compression
News publishers take paywall-blocker 12ft.io offline
theverge.comΒ·4hΒ·
Discuss: r/Piracy, r/longform
πŸ“‘RSS Extensions
Testing Tracing Locally with OpenTelemetry
blog.apartment304.comΒ·3dΒ·
Discuss: Hacker News
πŸ‘οΈSystem Observability
EU age verification app: Five countries begin testing
heise.deΒ·2d
πŸ‡ΈπŸ‡ͺNordic Cryptography
Open Source Maintainers Feeling the Weight of the EU’s Cyber Resilience Act
socket.devΒ·2hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
From URL to Server’s secrets: Path Traversal Vulnerability
infosecwriteups.comΒ·3d
πŸ”“Hacking
Knowledge Without Power: AI, Infrastructure, and the Ethics of Design
medium.comΒ·8hΒ·
Discuss: Hacker News
βš–οΈEmulation Ethics
Hackers are abusing 'FileFix' technique to drop RATs during ransomware attacks
techradar.comΒ·2d
πŸ”“Hacking
Divide-Then-Rule: A Cluster-Driven Hierarchical Interpolator for Attribute-Missing Graphs
arxiv.orgΒ·1d
πŸ•ΈοΈNeo4j
Show HN: I built an SDK for building an AI RAG app with Supabase and pgvector
github.comΒ·1dΒ·
Discuss: Hacker News
πŸŒ€Brotli Internals
Machine Learning Fundamentals: decision trees project
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”—Topological Sorting
I Accidentally Exposed My API Keys
infosecwriteups.comΒ·16h
πŸ”“Hacking
Using LLVM To Supercharge AI Model Execution On Edge Devices
hackernoon.comΒ·13h
🏭Compiler Backends
Backscatter Device-aided Integrated Sensing and Communication: A Pareto Optimization Framework
arxiv.orgΒ·2d
πŸ“‘Bluetooth Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap