Skip to main content
Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Capability Systems
Object Capabilities, Access Control, Security Models, seL4
Filter Results
Timeframe
Hot
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
16030
posts in
127.8
ms
The Agent
Mesh
: Why "
Governance
" is actually an Engineering Problem
dev.to
·
4h
·
Discuss:
DEV
🤖
Network Automation
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Towards a
Goal-Centric
Assessment of
Requirements
Engineering Methods for Privacy by Design
arxiv.org
·
19h
🔒
WASM Capabilities
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Build Smart Security with
K230
:
OCR
& 3D Face Mesh
hackster.io
·
20h
🔐
HSM Integration
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Designing
an
Authentication
System: A Dialogue in Four Scenes (1997)
web.mit.edu
·
2d
·
Discuss:
Hacker News
🎫
Kerberos History
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
OWASP
Top 10 2025 – What is new and what has actually
changed
blog.knowit.eu
·
1d
🔌
Interface Evolution
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
From
runtime
risk to real‑time defense:
Securing
AI agents
microsoft.com
·
1d
🔒
WASM Capabilities
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
**Abstract:** This paper introduces a novel system for automated metadata
harmonization
and semantic enrichment of
disparate
industrial standards. Leveraging...
freederia.com
·
43m
📋
Document Grammar
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
The Five Levels: from
Spicy
Autocomplete
to the Software Factory
werd.io
·
1d
🔄
Language Evolution
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
The human
paradox
at the center of modern cyber
resilience
techradar.com
·
1d
🔓
Hacking
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
European
reliance
on US software: A digital
sovereignty
challenge
france24.com
·
10h
🐚
Nordic Shell
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
LLMs create a new
blind
spot in
observability
thenewstack.io
·
6h
👁️
System Observability
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Securing
Agents in Production (Agentic
Runtime
, #1)
blog.palantir.com
·
2d
·
Discuss:
Hacker News
🔒
WASM Capabilities
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
You Can't Fake Object Storage: Multi-Protocol
Promised
Everything, Delivered
Compromise
blog.min.io
·
1d
🌐
Edge Preservation
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Metriport
(YC
S22
) is hiring a security eng to harden healthcare data infra
ycombinator.com
·
7h
·
Discuss:
Hacker News
🏠
Homelab Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Apple study reveals AI
controllability
is fragile and
varies
wildly by task and model
the-decoder.com
·
9h
✨
Effect Handlers
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Exploring common
centralized
and
decentralized
approaches to secrets management
aws.amazon.com
·
1d
🌳
Archive Merkle Trees
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Making the Most of Your
Docker
Hardened
Images Enterprise Trial - Part 2
docker.com
·
3h
📦
Container Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Automate your security
whack-a-mole
: Q&A with
Exaforce
stackoverflow.blog
·
2d
⚡
Proof Automation
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
The New Software Engineering World Order (
Ralph
Loop
Disruption
)
julianmwagner.com
·
1d
·
Discuss:
Hacker News
🔄
Language Evolution
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Subagents
, Commands and Skills Are
Converging
vivekhaldar.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
⚡
Proof Automation
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help