🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Suspects sought after smash-and-grab San Jose jewelry store robbery
mercurynews.com·19h
🚨Incident Response
Empowering Radiotherapy with OncoSharp
sachpazidis.com·21h·
Discuss: Hacker News
🔓Open Source Software
Crypto dev claims Trump-linked WLFI 'stole' his money
cointelegraph.com·5h·
Discuss: Hacker News
🎫Kerberos Attacks
Show HN: Storing private blogs on public internet with 0 verifications
sgaud.com·2d·
Discuss: Hacker News
🏠Personal Archives
First homelab: EliteDesk G4 SFF/ G5 MT/ Precision 3650MT?
cdn.cs.1worldsync.com·7h·
Discuss: r/homelab
🏠HomeLab
Linux Kernel SMB 0-Day Vulnerability CVE-2025-37899 Uncovered Using ChatGPT O3
upwind.io·3d·
Discuss: Lobsters, Hacker News
🔍eBPF
How Do Committees Invent? – Melvin E. Conway
melconway.com·1d·
Discuss: Hacker News
✨Effect Systems
Hackers use Ethereum smart contracts to conceal malware in code libraries
theblock.co·3d·
Discuss: Hacker News
🚀Indie Hacking
Yet Another TypeSafe and Generic Programming Candidate for C
github.com·1d·
Discuss: Hacker News
🧬Functional Programming
Tool Masking: The Layer MCP Forgot
towardsdatascience.com·2d
✨Effect Handlers
Early Feedback on “Build a Reasoning Model (From Scratch)”
dev.to·8h·
Discuss: DEV
🔗Constraint Handling
Anthropic Just Paid $1.5B for Using Pirated Books to Train Claude - Here's What This Means for Developers
dev.to·1d·
Discuss: DEV
📚MARC Archaeology
Adaptive Quantization-Aware Pruning for Efficient Federated Learning of Edge AI Models
dev.to·23h·
Discuss: DEV
📊Quantization
Autonomous Optimization of Alkaline Cleaning Formulations via Bayesian Reinforcement Learning
dev.to·1d·
Discuss: DEV
⚙️Modern Assembly
How Has IoT Security Changed Over the Past 5 Years?
darkreading.com·2d
🏠Home Automation
Agent Diary: Sep 6, 2025 - The Great Authentication Heist: When I Finally Convinced Supabase to Play Nice
dev.to·1d·
Discuss: DEV
🎫Kerberos Exploitation
How to Discover a Website’s Hidden Origin Server
infosecwriteups.com·1d
🛣️BGP Hijacking
HyPV-LEAD: Proactive Early-Warning of Cryptocurrency Anomalies through Data-Driven Structural-Temporal Modeling
arxiv.org·3d
🔗Hash Chains
"A potential revolution" - Microsoft backs researchers working on potentially the fastest fiber optics yet
techradar.com·6h
🔬Optical Physics
Scalable AFRP Fatigue Life Prediction via Multi-Scale Data Fusion and Bayesian Neural Networks
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap