๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

x86 Assembly Exercise #1: Toy kill Program (Solution)
blog.codingconfessions.comยท3h
๐ŸšShell Calculus
The Trump administration is making viruses great again | Arwa Mahdawi
theguardian.comยท9h
๐Ÿ›กCybersecurity
GitLab Duo Agent Platform Public Beta: Next-gen AI orchestration and more
about.gitlab.comยท2d
๐Ÿ”ŒInterface Evolution
Unexpected inconsistency in records
codeblog.jonskeet.ukยท9hยท
Discuss: Hacker News
๐Ÿ›ก๏ธProof-Carrying Archives
Education Department will release some frozen grants supporting after-school and summer programs
the-independent.comยท1d
๐Ÿ•ธLinked data
๐Ÿš€ Why You Should Never Settle for a โ‚น20,000 Freelance Website Again
dev.toยท17hยท
Discuss: DEV
๐Ÿš€Indie Hacking
At least 20 injured after vehicle โ€˜ploughs into crowdโ€™ in Los Angeles
the-independent.comยท11h
๐Ÿ›กCybersecurity
Using AI in the Development of Stdlib
blog.stdlib.ioยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Ask HN: How to engage community before open-sourcing, and how to license?
news.ycombinator.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
ESP32 Plugs In to Real-Time Crypto Prices
hackaday.comยท1d
๐ŸŒŠStream Ciphers
Partial decidability protocol for the Wang tiling problem from statistical mechanics and chaotic mapping
arxiv.orgยท1d
๐ŸŽฏPerformance Proofs
"What do you expect? You're part of the internet": Analyzing Celebrities' Experiences as Usees of Deepfake Technology
arxiv.orgยท1d
๐Ÿ›Digital humanities
TekNix Corporation and the Push for Smarter Enterprise Tools
dev.toยท12hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Build an AI Agent And Win ๐Ÿ’ธ
dev.toยท1dยท
Discuss: DEV
๐ŸŒCultural Algorithms
Chinese authorities are using a new tool to hack seized phones and extract data
techcrunch.comยท3dยท
Discuss: Hacker News, r/testsubredditindia1
๐Ÿ”“Hacking
Advanced PDF Optimization Techniques - 1752828
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ธPNG Optimization
CMER: A Context-Aware Approach for Mining Ethical Concern-related App Reviews
arxiv.orgยท4d
๐Ÿ•ต๏ธMetadata Mining
Your 92% Accurate AI Model Might Be Dangerous (Here's Why)
dev.toยท1dยท
Discuss: DEV
๐Ÿ”งHardware Verification
๐Ÿ›๏ธ Using Blockchain to Anchor AI: Why Future AI Systems Require Consensus and Censorship Resistance
dev.toยท2dยท
Discuss: DEV
๐ŸคDistributed Consensus
Can We Predict Alignment Before Models Finish Thinking? Towards Monitoring Misaligned Reasoning Models
arxiv.orgยท2d
๐Ÿ’ปLocal LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap