๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Systems

Object Capabilities, Access Control, Security Models, seL4

When Kernel Comments Get Weird: The Tale of `drivers/char/mem.c`
elisa.techยท1d
๐Ÿ”eBPF
Power of CAD software in accelerating product development in chemical industries
chemistryworld.comยท12hยท
Discuss: Hacker News
โ˜•Precision Brewing
Strategies for securing non-human identities (services, workloads, AI agents)
cerbos.devยท4dยท
Discuss: Hacker News, r/programming
๐ŸŽฏThreat Hunting
Isolating CSS Inheritance
blog.dwac.devยท1dยท
Discuss: Hacker News
๐Ÿฆ‹Format Evolution
The Center for Human-Compatible Artificial Intelligence Is Hiring
humancompatible.aiยท23hยท
Discuss: Hacker News
๐Ÿ’ปCS
The world has a running Rational R1000/400 computer again (2019)
datamuseum.dkยท3dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Tech bros hate this college student. CA should listen what she's saying about AI
latimes.comยท8hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
Skip to the End
thenanyu.comยท1dยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Why Your Docs-as-Code Toolchain Is Holding You Back
thecontentwrangler.comยท1dยท
Discuss: Hacker News
๐ŸŒณGit Internals
KidSafe Potty Training Sense
hackster.ioยท1d
๐Ÿ Home Automation
Suggestions for CNCF Repos to Contribute (Go/Kubernetes + eBPF/XDP Interest)
reddit.comยท14hยท
Discuss: r/kubernetes
๐Ÿ•ธ๏ธMesh Archiving
CTourLLM: Enhancing LLMs with Chinese Tourism Knowledge
arxiv.orgยท1h
๐Ÿ”Information Retrieval
Automated Fault Identification in Shell-and-Tube Heat Exchangers via Spectral Analysis and Deep Learning
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStream Processing
GPT-5 Thinking in ChatGPT (a.k.a. Research Goblin) is good at search
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
Apple's biggest announcement today was Memory Integrity Enforcement
victorwynne.comยท7hยท
Discuss: Hacker News
๐Ÿท๏ธMemory Tagging
Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous Driving
arxiv.orgยท1d
๐Ÿ“ŠComputational Geometry
Hijacking Windows Processes: A Step-By-Step Guide
infosecwriteups.comยท1d
๐Ÿ›ก๏ธeBPF Security
Widespread NPM Supply Chain Attack: Breaking Down Impact and Scope Across Debug
wiz.ioยท17hยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Reconstruction Alignment Improves Unified Multimodal Models
arxiv.orgยท1h
๐Ÿ“Projective Geometry
The Architecture of AI Transformation: Four Strategic Patterns and an Emerging Frontier
arxiv.orgยท6d
๐Ÿ•นEmulation Theory
Loading...Loading more...
AboutBlogChangelogRoadmap