๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›๏ธ Byzantine Archival

Distributed Preservation, Fault Tolerance, Consensus Protocols, Archive Replication

Iceberg, the Right Idea โ€“ The Wrong Spec โ€“ Part 2 of 2: The Spec
database-doctor.comยท4dยท
Discuss: Hacker News
๐Ÿ”งKAITAI
Blockchain Apps Aren't That Decentralized
zach.codesยท1dยท
Discuss: Hacker News
๐ŸคDistributed Consensus
One Third of the Web Will Stop Working in 4 Days
lowendbox.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Show HN: Elf0 โ€“ Build and run AI agent workflows in YAML (CLI)
elf0.comยท1dยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365
news.sophos.comยท2d
๐ŸŽซKerberos History
AI vs Technical Debt: Is This a Race To The Bottom?
deepdocs.devยท1dยท
Discuss: r/programming
๐Ÿ“Code Metrics
Phishers Abuse Microsoft 365 to Spoof Internal Users
darkreading.comยท1d
๐ŸŽฏNTLM Attacks
Vibe coding tool Cursor's MCP implementation allows persistent code execution
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
What Vibe Coding Means for the Enterprise: Fast Code, Real Considerations
devops.comยท4h
๐Ÿ“Code Metrics
Zip Me In: How I Used Archive Bombs and Zip Slip to Write Anywhere
infosecwriteups.comยท22h
๐Ÿ’ฃZIP Vulnerabilities
DB Environments That Donโ€™t Suck: A Devโ€™s Guide to Not Breaking Prod
dev.toยท1dยท
Discuss: DEV
๐ŸงฉSQLite Extensions
Daily briefing: This marsupial is biofluorescent โ€” the monthโ€™s best science images
nature.comยท20h
๐ŸŒก๏ธPreservation Physics
EBV induces CNS homing of B cells attracting inflammatory T cells
nature.comยท21h
๐ŸงฌCopy Number Variants
Topolow: Force-Directed Euclidean Embedding of Dissimilarity Data with Robustness Against Non-Metricity and Sparsity
arxiv.orgยท2d
๐ŸŒComputational Topology
Reinforcement Learning for Target Zone Blood Glucose Control
arxiv.orgยท9h
๐Ÿ”ฒCellular Automata
NetBSD 11.0 Release Process Underway
discoverbsd.comยท3d
๐Ÿ”ŒOperating system internals
PromptSafe: Gated Prompt Tuning for Safe Text-to-Image Generation
arxiv.orgยท2d
๐ŸงชBinary Fuzzing
Attractive Metadata Attack: Inducing LLM Agents to Invoke Malicious Tools
arxiv.orgยท2d
โšกProof Automation
Building a Personal AI Info Pipeline: Semantic Monitoring with YAML and GPT
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
CADD: Context aware disease deviations via restoration of brain images using normative conditional diffusion models
arxiv.orgยท1d
๐ŸŒ€Differential Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap