🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Capability Systems

Object Capabilities, Access Control, Security Models, seL4

Detection Engineering: Practicing Detection-as-Code – Introduction – Part 1
blog.nviso.eu·2d
🎯Threat Hunting
The cloud-native imperative for effective cyber resilience
theregister.com·1d
💾Persistence Strategies
Plurality Philosophy in an Oversized Nutshell
vitalik.eth.limo·3h·
Discuss: Hacker News
🧲Magnetic Philosophy
Rethinking Risk in the Age of AI
hackerone.com·1d
🎯Threat Hunting
Mechanize's CEO wants to use AI to automate every job — including his own
businessinsider.com·3h
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Speclinter MCP
github.com·19h·
Discuss: Hacker News
🔒WASM Capabilities
AI Agents Under the Hood
blog.surkar.in·2d·
Discuss: Hacker News
⚡Proof Automation
An InfoSec Architect's First Taste of Temporal
supasaf.com·1d·
Discuss: Hacker News
⏰Temporal Logic
Object Oriented Programming is an expensive disaster which must end
medium.com·1d·
Discuss: Hacker News
💻Programming languages
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.com·1d·
Discuss: Substack
💻Local LLMs
​​RAG is dead: why enterprises are shifting to agent-based AI architectures
techradar.com·21h
💾Persistence Strategies
RoboMonkey: Test Time Compute for Robotics
robomonkey-vla.github.io·7h·
Discuss: Hacker News
🎯Emulator Accuracy
PixLab ID Scan API: The Complete Developer's Guide to Global Document Processing
dev.to·7h·
Discuss: DEV
📄Document Digitization
Understanding Everything as Code: A Taxonomy and Conceptual Model
arxiv.org·2d
🔢Denotational Semantics
Using Protobuf to make Jira Cloud faster
atlassian.com·11h·
Discuss: Hacker News
🌊Streaming Systems
Self-Review Framework for Enhancing Instruction Following Capability of LLM
arxiv.org·1d
✓Automated Theorem Proving
Introducing Phi-4-mini-flash-reasoning
azure.microsoft.com·19h·
Discuss: Hacker News
🧮Z3 Applications
Build an AI-Ready Data Foundation with MongoDB Atlas on Azure
mongodb.com·1d·
Discuss: Hacker News
🏺Database Archaeology
5 vital features reliable endpoint protection services need to have
techradar.com·1d
🛡️eBPF Security
The inevitable trend toward low code makes programming tedious
thefoggiest.dev·12h·
Discuss: Hacker News
📏Code Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap