🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📼 Cassette Hacking

Tape Modification, Audio Exploitation, Sequential Attacks, Magnetic Security

If only I'd known ... Debian repo signing
jpmens.net·23h
❄️Nixpkgs
FUSE Passthrough
docs.kernel.org·1d·
Discuss: Hacker News
🛡️eBPF Security
Technoblogy – A NeoPixel Driver Using AVR Hardware
technoblogy.com·1d·
Discuss: Hacker News
⚡Circuit Design
Practical Diff Testing of Stateful Applications (VLDB'25)
muratbuffalo.blogspot.com·1d·
Discuss: Hacker News
🔄Reproducible Builds
Most creators will fail in the next 12 months
letters.thedankoe.com·2h·
Discuss: Hacker News
🎯Content Recommendation
AI for the Rest of Us
wsvincent.com·8h·
Discuss: Hacker News
🌀Brotli Internals
Lock down your critical infrastructure, CISA begs admins
theregister.com·4h
🛡Cybersecurity
August 14, 2025: Intermediate Scraping Webinar (4 hour) [Americas / Europe-friendly time]
bellingcat.com·21h
⚙️Proof Engineering
Software Engineering Laws - System Architecture
leadership.garden·4h
🔄Lens Laws
Hackers are now mimicking government websites using AI - everything you need to know to stay safe
techradar.com·3d
🕵️Vector Smuggling
Provably Transformers Harness Multi-Concept Word Semantics for Efficient In-Context Learning
arxiv.org·17h
🧠Machine Learning
Show HN: Guardian Protocol – Open-Source Ethereum Security Framework
github.com·2d·
Discuss: Hacker News
🔐CBOR
U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·21h
🔓Hacking
AI-Powered Predictive Maintenance for Intermodal Container Logistics Using Hybrid Bayesian Networks
dev.to·1d·
Discuss: DEV
🧮Kolmogorov Bounds
VISOR: Visual Input-based Steering for Output Redirection in Vision-Language Models
arxiv.org·1d
⟷Bidirectional Programming
UK immigration system targeted by hackers - dangerous new phishing campaign hits Sponsorship Management System
techradar.com·10h
🔓Hacking
Automated Knowledge Graph Validation via Multi-Modal Deep Reasoning
dev.to·11h·
Discuss: DEV
🔗Constraint Handling
Automated Assessment of Turbine Blade Erosion using Multi-Modal Data Fusion & Deep Learning
dev.to·3h·
Discuss: DEV
🏺Computational Archaeology
How NOT to Build a GPT-5 Style LLM Router
dev.to·3h·
Discuss: DEV
⚡Incremental Computation
Automated Fault Characterization in IEC 62304-Based Medical Device Software
dev.to·2d·
Discuss: DEV
📏Code Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap