๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

Ministers urged not to remove legal rights and protections for Send children
the-independent.comยท6h
โš–๏ธArchive Ethics
A Lockpicking Robot That Can Sense the Pins
hackaday.comยท6h
๐Ÿ”“Password Cracking
Cryptography for the Everyday Developer: Understanding DES - The Data Encryption Standard
sookocheff.comยท3d
๐Ÿ”Cryptographic Archaeology
Heavyweight.cc, an art project about lawyer vibes
kendraalbert.comยท11hยท
Discuss: Hacker News
๐Ÿ›Digital humanities
Gren 25S: Easier interop, concurrent tasks and zero-install packages
gren-lang.orgยท18hยท
Discuss: Lobsters, Hacker News
๐ŸšNordic Shell
DeepMindโ€™s Quest for Self-Improving Table Tennis Agents
spectrum.ieee.orgยท14h
๐Ÿ”ฒCellular Automata
W3 AI Agent Protocol Community Group
w3.orgยท18hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
The New Distribution Game: Building Products for Agents, Not Users
productcurious.comยท22hยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Security Principles for Designing an Unhackable Crypto Wallet
cacm.acm.orgยท4d
๐ŸŒณArchive Merkle Trees
The Future of Wearable Tech,Meta AIโ€™s Ray-Ban Smart Glasses,and the Potential for VR-Integrated Gamification
dev.toยท1dยท
Discuss: DEV
โœ‹Tactile Computing
One Step is Enough: Multi-Agent Reinforcement Learning based on One-Step Policy Optimization for Order Dispatch on Ride-Sharing Platforms
arxiv.orgยท1h
๐Ÿ”ฒCellular Automata
GEMINUS: Dual-aware Global and Scene-Adaptive Mixture-of-Experts for End-to-End Autonomous Driving
arxiv.orgยท1h
๐ŸŒ€Riemannian Computing
Enhancing Natural Language Inference Performance with Knowledge Graph for COVID-19 Automated Fact-Checking in Indonesian Language
arxiv.orgยท1h
โšกProof Automation
Vehicular Cloud Computing: A cost-effective alternative to Edge Computing in 5G networks
arxiv.orgยท1h
๐ŸŽ๏ธVarnish Cache
5 Essential Python Design Patterns for Scalable and Efficient Code
dev.toยท3dยท
Discuss: DEV
๐ŸงฉWASM Components
The Case for Contextual Copyleft: Licensing Open Source Training Data and Generative AI
arxiv.orgยท4d
๐Ÿ”“Open Source Software
IConMark: Robust Interpretable Concept-Based Watermark For AI Images
arxiv.orgยท1d
๐Ÿ’งDigital Watermarking
Baring the DNS Traces of the Slow Pisces Attack on Cryptocurrency Developers
circleid.comยท8h
๐Ÿ›ฃ๏ธBGP Hijacking
Agents are advancing, fast. Security Needs to Keep Pace
techradar.comยท3d
๐Ÿ”Capability Systems
System Design Deep Dive: How Stripe Powers Global Payments with Scalable Architecture
dev.toยท10hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap