🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Belgian CVD is deeply broken
devae.re·17h·
Discuss: Hacker News
🛡Cybersecurity
InfoSec News Nuggets 7/8/2025
aboutdfir.com·19h
🛡Cybersecurity
Graph Diffusion-Based AeBS Deployment and Resource Allocation for RSMA-Enabled URLLC Low-Altitude Economy Networks
arxiv.org·1d
🕸️Network Topology
The Open-Source Software Saving the Internet From AI Bot Scrapers
news.slashdot.org·1d
🚀Indie Hacking
Let's Encrypt issues first IP certificate
heise.de·1d
🔐Certificate Analysis
Built a Golang CLI tool for web reconnaissance – looking for feedback
reddit.com·2d·
Discuss: r/golang
🕵️Domain Enumeration
Programming Extensible Data Types in Rust with CGP - Part 1: Modular App Construction and Extensible Builders
contextgeneric.dev·1d·
Discuss: Lobsters, Hacker News, r/programming
🔒Type Safety
Creating a Webhook API Endpoint with n8n
dev.to·1d·
Discuss: DEV
🌐Network Protocols
MitM Flaw in Bitchat: Identity Is a Bitchat Challenge
supernetworks.org·1d·
Discuss: Hacker News
🧪Protocol Fuzzing
From Hardware Hacker to CTO: Building Teams That Scale • Meri Williams & Charles Humble • GOTO 2025
youtube.com·20h
🔄Reproducible Builds
Breakthrough in Semiconductor Technology Paves the Way for Faster 6G Networks
techbriefs.com·17h·
Discuss: Hacker News
🖥️Terminal Renaissance
I use mesh Wi-Fi instead of a standalone router
pocket-lint.com·2d·
Discuss: Hacker News
🕸️Mesh Networking
How Does PGP Encryption Work—and Is It Still Secure in 2025?
securityscorecard.com·16h
🔐Quantum Security
I solved the IIT-JEE Mains paper with LLM. Here are the results
iexplain.app·1d·
Discuss: Hacker News
📐Interval Arithmetic
Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark]
arxiv.org·4h
🌳Archive Merkle Trees
What Is DPI Engine?
habr.com·3d·
Discuss: Hacker News
🕵️Network Forensics
C4 Bomb: Blowing Up Chrome's AppBound Cookie Encryption
cyberark.com·23h·
Discuss: Hacker News
🛡️WASM Security
A New Blueprint for Bitcoin Contracts: Off-Chain Efficiency, On-Chain Guarantees
hackernoon.com·1d
🔗Hash Chains
Query OpenStreetMap Using SQL
github.com·18h·
Discuss: Hacker News
🧩SQLite Extensions
OpenTelemetry from 0 to 100
nais.io·2d·
Discuss: Hacker News
👁️Observatory Systems
Loading...Loading more...
AboutBlogChangelogRoadmap