๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ผ Cassette Hacking

Tape Modification, Audio Exploitation, Sequential Attacks, Magnetic Security

Defending Digital Trust: Fighting Brand Impersonation in the Wild
bitsight.comยท3d
๐Ÿ”PKI Archaeology
Guess what else GPT-5 is bad at? Security
cyberscoop.comยท2d
๐Ÿ”“Hacking
Young Americans Push Playback Beyond 1x as Platforms Widen Speed Controls
tech.slashdot.orgยท2d
๐Ÿ’ฟFLAC Archaeology
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
securityweek.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Managing Time Shiftable Devices
bitsandtheorems.comยท3dยท
Discuss: Hacker News
๐Ÿ Home Automation
6 Bit DNA Encoding with Complements via XOR (biowisdom)
cyberwarhead.comยท12h
๐ŸงฌPalindrome Codes
Study pits super-recognizers against digitally manipulated face images
phys.orgยท3d
๐ŸŽฏThreat Hunting
Poisoned at 0.1%
hackernoon.comยท10h
๐Ÿ”—Data Provenance
Smartphone Hackability, or, A Pocket Computer That Isnโ€™t
hackaday.comยท4d
๐Ÿ“กBluetooth Archaeology
A composable rate limiter for Go
reddit.comยท1dยท
Discuss: r/golang
๐Ÿ”’Linear Types
WAVEGO Pro 12-DOF bionic robot dog supports ESP-NOW and AI vision through Raspberry Pi 4/5 SBC
cnx-software.comยท2d
๐Ÿ”ŒSingle Board PC
STAMP: Multi-pattern Attention-aware Multiple Instance Learning for STAS Diagnosis in Multi-center Histopathology Images
arxiv.orgยท13h
๐ŸงฎVector Embeddings
Software Engineering Laws - System Architecture
leadership.gardenยท1d
๐Ÿ”„Lens Laws
How NOT to Build a GPT-5 Style LLM Router
dev.toยท22hยท
Discuss: DEV
โšกIncremental Computation
PressSoul
hackster.ioยท1d
๐Ÿ–ฅ๏ธModern Terminals
Automated Fault Characterization in IEC 62304-Based Medical Device Software
dev.toยท3dยท
Discuss: DEV
๐Ÿ“Code Metrics
The 10 Ethical Risks of AI in Testing
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Concolic Testing
Show HN: Guardian Protocol โ€“ Open-Source Ethereum Security Framework
github.comยท3dยท
Discuss: Hacker News
๐Ÿ”CBOR
Russia's RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks
theregister.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
SOFA: Deep Learning Framework for Simulating and Optimizing Atrial Fibrillation Ablation
arxiv.orgยท3d
๐Ÿง Neural Codecs
Loading...Loading more...
AboutBlogChangelogRoadmap