🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

From Hardware Hacker to CTO: Building Teams That Scale • Meri Williams & Charles Humble • GOTO 2025
youtube.com·1d
🔄Reproducible Builds
I use mesh Wi-Fi instead of a standalone router
pocket-lint.com·2d·
Discuss: Hacker News
🕸️Mesh Networking
How Does PGP Encryption Work—and Is It Still Secure in 2025?
securityscorecard.com·21h
🔐Quantum Security
I solved the IIT-JEE Mains paper with LLM. Here are the results
iexplain.app·1d·
Discuss: Hacker News
📐Interval Arithmetic
Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark]
arxiv.org·9h
🌳Archive Merkle Trees
OpenThread – an open-source implementation of Thread
openthread.io·2h·
Discuss: Hacker News
🌐WebSocket Framing
What Is DPI Engine?
habr.com·3d·
Discuss: Hacker News
🕵️Network Forensics
C4 Bomb: Blowing Up Chrome's AppBound Cookie Encryption
cyberark.com·1d·
Discuss: Hacker News
🛡️WASM Security
5 vital features reliable endpoint protection services need to have
techradar.com·4h
🛡️eBPF Security
A New Blueprint for Bitcoin Contracts: Off-Chain Efficiency, On-Chain Guarantees
hackernoon.com·1d
🔗Hash Chains
Query OpenStreetMap Using SQL
github.com·23h·
Discuss: Hacker News
🧩SQLite Extensions
Complete guide to implementing OpenTelemetry in Nextjs applications - Traces, Metrics & Logs
signoz.io·2h·
Discuss: Hacker News, r/programming
👁️System Observability
The MCP hype is a distraction. AI Agents should just build their own tools
rtrvr.ai·4h·
Discuss: Hacker News
🔌Interface Evolution
Does Movable Antenna Present A Dual-edged Nature? From the Perspective of Physical Layer Security: A Joint Design of Fixed-position Antenna and Movable Antenna
arxiv.org·9h
🌊Stream Ciphers
Open-Source Security Paradox: More Code, More Validation
onekey.so·3h·
Discuss: Hacker News
🔓Open Source Software
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
arstechnica.com·2h
🔓Hacking
You Should Run a Certificate Transparency Log
words.filippo.io·1d·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Python Fundamentals: blocking IO
dev.to·1h·
Discuss: DEV
🌊Stream Processing
ASSURE: Metamorphic Testing for AI-powered Browser Extensions
arxiv.org·9h
⚡Proof Automation
Exposing a web service with Cloudflare Tunnel
erisa.dev·4h·
Discuss: Hacker News
🌐DNS over QUIC
Loading...Loading more...
AboutBlogChangelogRoadmap