🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📼 Cassette Hacking

Tape Modification, Audio Exploitation, Sequential Attacks, Magnetic Security

The Cassette Recorder That Went to the Moon
obsoletesony.substack.com·3d·
Discuss: Substack
📼DAT Archives
Show HN: KickPredict – Simple football match predictions By AI
kickpredict.ai·9h·
Discuss: Hacker News
⚖️Feed Ranking
Lego Transformers Soundwave
lego.com·1d·
Discuss: Hacker News
🎮Gameboy Emulation
The Art of the Massage: Why Great Ideas Need Time to Breath
philosophermaker.substack.com·17h·
Discuss: Substack
🍎Apple Computing
Create a travel planning agentic workflow with Amazon Nova
aws.amazon.com·9h
🌊Streaming Systems
If AI takes most of our jobs, money as we know it will be over. What then?
theconversation.com·1d·
Discuss: Hacker News
🧲Magnetic Philosophy
Who does your assistant serve?
xeiaso.net·2d·
Discuss: Lobsters, Hacker News, r/longform
🖥️Terminal Renaissance
Patch now! Attacks on Fortinet IT security solutions may be imminent
heise.de·1d
🔓Hacking
Congestion control at IETF 123
blog.apnic.net·1d
📡Network Protocol Design
Show HN: Catjam a VSCode extension that grooves with your typing speed
github.com·15h·
Discuss: Hacker News
🔠Terminal Fonts
Securing Meta's Production PKI Credentials
usenix.org·5d
🎯NTLM Attacks
GPT-5: Breakthroughs and Applications
dev.to·1d·
Discuss: DEV
🎙️Whisper
EVCtrl: Efficient Control Adapter for Visual Generation
arxiv.org·1d
🎬WebCodecs
The Hidden Commands Inside AI Bureaucracy
dev.to·17h·
Discuss: DEV
✨Algebraic Effects
Meta-Learning Eats Itself: When AI Tools Train on Their Own Usage
zakelfassi.com·43m·
Discuss: Hacker News
🌍Cultural Algorithms
Here's Why You Should Get a New Wireless Router
hackernoon.com·1d
📡Bluetooth Archaeology
Autonomous Fleet Routing Optimization via Multi-Constraint Bayesian Optimization and Digital Twin Simulation
dev.to·2d·
Discuss: DEV
⚡Z3 Optimization
Automated Multi-Modal Protein Expression Analysis via Dynamic Federated Learning
dev.to·2d·
Discuss: DEV
🔍Vector Forensics
Navigating the modern security stack
techradar.com·4d
🎯Threat Hunting
The Hidden Engineering Behind Building Massive Software Images
dev.to·1d·
Discuss: DEV
🔄Reproducible Builds
Loading...Loading more...
AboutBlogChangelogRoadmap