๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“œ Binary Philology

Format Manuscripts, Code Paleography, Digital Textual Criticism, Bit Archaeology

Worth Reading 090925
rule11.techยท1d
๐Ÿง…Tor Networks
Bots account for almost a third of web traffic
flowingdata.comยท10h
๐ŸŒWARC Forensics
Breakthrough in twin DNA analysis leads to historic conviction
wtop.comยท1dยท
Discuss: Hacker News
๐Ÿ”Tape Forensics
Preventing business disruption and building cyber-resilience with MDR
welivesecurity.comยท1d
๐ŸšจIncident Response
Show HN: Talk to any model with your team
showcase.thytus.comยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Pluralistic: Why Wikipedia works (05 Sep 2025)
pluralistic.netยท5dยท
Discuss: Hacker News
๐Ÿ“ฐContent Curation
Matmul on Blackwell: Part 2 โ€“ Using Hardware Features to Optimize Matmul
modular.comยท5dยท
Discuss: Hacker News
โšกSIMD Optimization
Hotels.com vs Booking.com
forums.anandtech.comยท1d
๐Ÿš€Query Optimization
Nintendo settles with accessory manufacturer for damages
heise.deยท1d
๐ŸบGaming Archaeology
Fraud with Apple gift cards: gangs from China busted in northern Europe
heise.deยท1d
๐Ÿ‡ธ๐Ÿ‡ชNordic Cryptography
You learn about possible plagiarism in a literary work. How does that affect your view of it? (The A. J. Finn story)
statmodeling.stat.columbia.eduยท2d
๐Ÿ”“Hacking
Ask HN: Technology Teacher Needs Validation from Smarter People
news.ycombinator.comยท2dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Synthetic generation of online social networks through homophily
arxiv.orgยท6d
๐Ÿ—œ๏ธGraph Compression
17 Best Places to Buying Verified Binance Accounts
dev.toยท1dยท
Discuss: DEV
๐ŸŽซKerberos Attacks
PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity
arxiv.orgยท6d
๐ŸบZIP Archaeology
DLocal Limited (DLO) Presents At Goldman Sachs Communacopia + Technology Conference 2025 Transcript
seekingalpha.comยท4h
๐Ÿง Query Planners
Welcome to the era of thin smartphones (whether you want it or not)
engadget.comยท4h
๐ŸŽApple Computing
Energy deficiency selects crowded live epithelial cells for extrusion
nature.comยท3h
๐ŸงฌCopy Number Variants
Memory in LlamaIndex: Building Intelligent Chat Agents
dev.toยท3dยท
Discuss: DEV
โšกHardware Transactional Memory
LiHRA: A LiDAR-Based HRI Dataset for Automated Risk Monitoring Methods
arxiv.orgยท1d
๐Ÿ“ŠComputational Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap