🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Meitantei Conan: Karakuri Jiin Satsujin Jiken
ephemeralenigmascom.wordpress.com·1d
🏺Gaming Archaeology
Gunnar Wolf: The comedy of computation, or, how I learned to stop worrying and love obsolescence
gwolf.org·2d
🧲Magnetic Philosophy
Hopping on an Earlier Flight: Optimal Waiting with Multiple Flights – NBER
nber.org·21h·
Discuss: Hacker News
🧮Kolmogorov Bounds
Whatever Happened To … Webrings (2012)
insufficientscotty.com·2d·
Discuss: Hacker News
📡DNS Archaeology
“New” TLDs are weird
anderegg.ca·1d
📡DNS Archaeology
'Tamed' algorithms and plummeting porn views: impact of UK online safety rules
news.sky.com·2d·
Discuss: Hacker News
🔤EBCDIC Privacy
The White House Is Going to Put Government Statistics on the Blockchain (Yeah, We Don’t Know Why Either)
gizmodo.com·1d·
Discuss: Hacker News
🔗Blockchain Archives
Trial and error: research and the criminal justice system
nature.com·1d
⚙️systems theory
Show HN: Implement BLAKE3 with Awk
github.com·5d·
Discuss: Hacker News
🔐Hash Functions
Justice Dept. Broadens Inquiry Into Key Players in Russia Investigation
nytimes.com·1d
🔬Archive Forensics
LLVM 21.1 Released With AMD GFX1250 Target, Improved RISC-V, New C/C++ Features
phoronix.com·1d·
Discuss: Hacker News
🖥️Modern CPU
Docker Desktop bug let containers hop the fence with barely a nudge
theregister.com·1d
📦Container Security
Elon Musk and xAI are suing Apple and OpenAI because Grok isn't topping the app charts
engadget.com·2d
🍎XNU Internals
Some victim-survivors take their own lives. We need to better understand how suicide and family violence are linked
phys.org·1d
🔗Data Provenance
Brave discovers a security flaw in Perplexity’s Comet browser
the-decoder.com·2d
🚀Indie Hacking
March for Australia website referenced white nationalist 'remigration'
abc.net.au·4h
💧Manuscript Watermarks
Scaling Expert Oversight of AI: HackerOne's Human-in-the-Loop Methodology
hackerone.com·6d
⚡Proof Automation
Social Identity in Human-Agent Interaction: A Primer
arxiv.org·2d
🔲Cellular Automata
Decoding clues in Bennu's surface composition to make sense of far-flung asteroids
phys.org·1d
🦴Database Paleontology
Cyber moves from back office to boardroom – and investors are paying attention
techradar.com·2d
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap