🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

The documentation says that CompanyName version information is required, but my program seems to work without it, so how required is it?
devblogs.microsoft.com·9h
🏺Format Archaeology
Jaguar Land Rover admits hackers may have taken data
bbc.com·9h
🔬Hardware Forensics
KDE launches its own distribution (again)
lwn.net·1h·
Discuss: Lobsters, Hacker News
🔌Operating system internals
Trump’s FCC Just Used A Fake ‘Investigation’ To Shower AT&T And Elon Musk With Billions In Valuable Spectrum
techdirt.com·11h
📊PCAP Analysis
Beware the QR code: How a new scam is costing consumers £10,000 per day
the-independent.com·9h
🎫Kerberos Attacks
Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World
wired.com·1d·
Discuss: Hacker News
🔓Hacking
Ask HN: Feedback on a new framework aiming at the classic RPC headaches
news.ycombinator.com·2d·
Discuss: Hacker News
⚡gRPC
[D] Graphrag pipeline that runs entirely locally with ollama and has full source attribution
reddit.com·1d·
Discuss: r/MachineLearning
⚡Proof Automation
[D] ICCV 2025 registration
reddit.com·11h·
Discuss: r/MachineLearning
🏛️Isabelle HOL
Legacy tech blunts UK top cops' fight against serious crime, inspectors find
theregister.com·1d
🔗Data Provenance
Plex users: Reset your password!
malwarebytes.com·13h
🔓Password Cracking
Ask HN: How much can we trust open-source projects or our hardware?
news.ycombinator.com·2d·
Discuss: Hacker News
🔒Hardware Attestation
Human gastroids to model regional patterning in early stomach development
nature.com·7h
🧬Copy Number Variants
How to prevent multi-accounting and stop fraud
fingerprint.com·2d
🔗Binary Similarity
K2 Think: Abu Dhabi's Efficient AI Model Challenges Industry Giants
dev.to·1d·
Discuss: DEV
🧠Intelligence Compression
Benchmarking Vision Transformers and CNNs for Thermal Photovoltaic Fault Detection with Explainable AI Validation
arxiv.org·19h
🔍Vector Forensics
🚨 Why Most AI Strategies Fail Before Audit Day — And the Six Roles That Can Save You 🚨
dev.to·11h·
Discuss: DEV
🎯Threat Hunting
Wasted Open Source efforts 😮
dev.to·14h·
Discuss: DEV
🔓Open Source Software
Autonomous Thermal Anomaly Detection via Multi-Modal Sensor Fusion and Dynamic Bayesian Networks
dev.to·1d·
Discuss: DEV
📊Homelab Monitoring
Apple slips up on ChillyHell macOS malware, lets it past security . . . for 4 years
theregister.com·4h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap