๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Systems

Object Capabilities, Access Control, Security Models, seL4

Our vision for the future of identity security? It's already in motion
oleria.comยท21hยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
Simple Methods Defend RAG Systems Well Against Real-World Attacks
arxiv.orgยท7h
๐Ÿ”Systems Hardening
Week 7 โ€” Learning Basic Concepts of Cybersecurity
infosecwriteups.comยท1d
๐Ÿ”ŒInterface Evolution
Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท4h
โœ…Archive Validation
Human-on-the-Loop: The New AI Control Model That Actually Works
thenewstack.ioยท20h
๐Ÿ Homelab Automation
Authentication vs. authorization: Whatโ€™s the difference?
proton.meยท1h
๐Ÿ”—Data Provenance
The SmartBase - IoT Adjustable Bed for Comfort and Safety (2019)
hackster.ioยท1hยท
Discuss: Lobsters
๐Ÿ Home Automation
From Drift to Discipline: How Governed Cognition Makes AI a Reliable Junior Developer
hackernoon.comยท13h
โš”๏ธLean Tactics
OWASP ASVS 5.0.0 is here!
scotthelme.ghost.ioยท1d
๐Ÿ›ก๏ธWASM Sandboxing
Unpacking Qualys Agentic AI: Technical Insights into Its Architecture and Capabilities
blog.qualys.comยท22h
โš™๏ธTLA+
How to Create Unbreakable Job Security: A Software Developer's Guide to Making Yourself Indispensable
getparthenon.comยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ’พPersistence Strategies
Extensions and Shadows (9)
sites.psu.eduยท21h
โœจEffect Handlers
AI agents, part 3: Adaptive designs optimize development and user experience
heise.deยท2h
โšกIncremental Computation
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท1d
โš—๏ธAlgebraic Coding
Cybersecurity Instruction Tuned Model
huggingface.coยท8hยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
What is The European Accessibility Act and why does it matter for business websites of all sizes?
techradar.comยท4h
โš–๏ธLegal Compliance
Turning Human Vulnerability Into Organizational Strength
darkreading.comยท21h
๐ŸŽฏThreat Hunting
Commercial product selection reflections
blog.scottlogic.comยท1d
๐ŸงฉWASM Components
I don't want to host services (but I do)
ergaster.orgยท5h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Decent Patterns
decentpatterns.comยท11h
๐Ÿ“‹Format Specification
Loading...Loading more...
AboutBlogChangelogRoadmap