🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Keeping Network Sites Online During Blackouts
labs.ripe.net·1d
🛡️eBPF Programs
Program verification is not all-or-nothing
lawrencecpaulson.github.io·5d
🎯Performance Proofs
Beelink EQi13 Pro Review – Part 3: Ubuntu 24.04 on an Intel Core i5-13500H mini PC
cnx-software.com·3d
🔌Operating system internals
Show HN: Generate and Copy Random IP Addresses
whatismyipaddressinquire.com·3d·
Discuss: Hacker News
🛣️BGP Hijacking
Tony Hoare: How did software get so reliable without proof?
blog.regehr.org·1d·
Discuss: Hacker News
⚙️Proof Engineering
Show HN: My portfolio in the style of a campy early-internet Geocities site
jmkod.es·1d·
Discuss: Hacker News
🚀Indie Hacking
How AI and politics hampered the secure open-source software movement
cybersecuritydive.com·23h
🔓Open Source Software
I replaced Animal Crossing's dialogue with a live LLM by hacking GameCube memory
joshfonseca.com·9h·
Discuss: Hacker News
🎮Gameboy Emulation
Ultra Ethernet: Fabric Setup
nwktimes.blogspot.com·3d·
Discuss: Hacker News
🤖Network Automation
typical: Data interchange with algebraic data types.
github.com·3d
📋Format Specification
JavaScript packages with billions of downloads were injected with malicious code in world's largest supply chain hack, geared to steal crypto — a phishing email...
tomshardware.com·21h
🔓Hacking
Insider breaches are a bigger security threat than ever before - here's how your business can stay safe
techradar.com·1d
🛡Cybersecurity
Automated Modal Assurance Criterion Validation via Fourier-Slepian Analysis and Machine Learning
dev.to·3d·
Discuss: DEV
📊Spectral Analysis
Behavioral Fingerprinting of Large Language Models
arxiv.org·2d
💻Local LLMs
Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous Driving
arxiv.org·1d
📊Computational Geometry
**Go System Call Optimization: Reducing Kernel Transitions for High-Performance Applications**
dev.to·2d·
Discuss: DEV
🌊Stream Processing
Your elected leaders: Taiji Kimura, Routing Security SIG Acting Chair
blog.apnic.net·2d
🌐Network Security
Automated Risk Stratification for Cardiovascular Drug Re-evaluation via Multi-Modal Data Fusion
dev.to·2d·
Discuss: DEV
🧠Machine Learning
Weekly: Questions and advice
reddit.com·1d·
Discuss: r/kubernetes
📰RSS Reading Practices
📰StackNews Digest
dev.to·2d·
Discuss: DEV
🖥️Modern Terminals
Loading...Loading more...
AboutBlogChangelogRoadmap