๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Systems

Object Capabilities, Access Control, Security Models, seL4

More SPICEyness
self-issued.infoยท1d
๐Ÿ“‹Format Specification
AI malware can now evade Microsoft Defender โ€” open-source LLM outsmarts tool around 8% of the time after three months of training
tomshardware.comยท7hยท
Discuss: r/technews
๐Ÿ”“Hacking
The Future Information Management Professional: Rising to the AI Challenge
info.aiim.orgยท8h
๐Ÿ“šMARC Evolution
Writing Bounds-Safe Code in C with Arrays
uecker.codeberg.pageยท2hยท
Discuss: Hacker News
๐Ÿง Separation Logic
Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps
soatok.blogยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Establishing a European trust service provider for the AWS European Sovereign Cloud
aws.amazon.comยท4h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
AI Agents Under the Hood
blog.surkar.inยท2dยท
Discuss: Hacker News
โšกProof Automation
You Shall Not Pass: Fine Grained Access Control with Row Level Security
cockroachlabs.comยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ”คEBCDIC Privacy
An InfoSec Architect's First Taste of Temporal
supasaf.comยท2dยท
Discuss: Hacker News
โฐTemporal Logic
I Changed My Mind: AI Will Replace Us
medium.comยท17mยท
Discuss: Hacker News
โšกProof Automation
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.comยท2dยท
Discuss: Substack
๐Ÿ’ปLocal LLMs
๐Ÿงฑ Building a Bulletproof SaaS Foundation with Node.js, TypeScript, PostgreSQL, Redis & CI/CD
dev.toยท3hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Programming Affordances That Invite Mistakes
thetechenabler.substack.comยท6hยท
Discuss: Substack
๐Ÿ”„Language Evolution
Speclinter MCP
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Worrying ServiceNow security flaw could let hackers steal private table data
techradar.comยท5h
๐Ÿ”“Hacking
Understanding Everything as Code: A Taxonomy and Conceptual Model
arxiv.orgยท2d
๐Ÿ”ขDenotational Semantics
The four-phase security approach to keep in mind for your AI transformation
techradar.comยท12h
๐ŸŽฏThreat Hunting
Self-Review Framework for Enhancing Instruction Following Capability of LLM
arxiv.orgยท1d
โœ“Automated Theorem Proving
5 Underappreciated JavaScript Libraries To Try in 2025
thenewstack.ioยท20m
๐ŸŽฌWebCodecs
5 vital features reliable endpoint protection services need to have
techradar.comยท1d
๐Ÿ›ก๏ธeBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap