🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

AWS Kiro: Arbitrary Code Execution via Indirect Prompt Injection
embracethered.com·5h
🛡️CLI Security
Discussing the Open Source, Open Threats? paper with Behzad and Ali
opensourcesecurity.io·1d
🔓Open Source Software
Position Regarding the "Chat Control" EU Regulation Proposal
techblog.bozho.net·11h·
Discuss: Hacker News
⚖️Legal Compliance
A new layer of security for certified Android devices
android-developers.googleblog.com·1d·
Discuss: Hacker News, r/Android
🛡️ARM TrustZone
RubyGems Security Response to Socket.dev and How We Protect the Ruby Ecosystem
blog.rubygems.org·1d·
Discuss: Hacker News, r/programming
❄️Nix Flakes
Analysis and Detection of RIS-based Spoofing in Integrated Sensing and Communication (ISAC)
arxiv.org·15h
⚖️RISC-V Formal
Introducing Cloudflare Application Confidence Score For AI Applications
blog.cloudflare.com·5h
👁️Observatory Systems
Fragmented SSE Is a Risk You Can’t Afford
blogs.cisco.com·7h
🔐Capability Systems
Learning ON Large Datasets Using Bit-String Trees
arxiv.org·15h
🗂️Vector Databases
MCP Gateways: Managing Multiple Servers Like a Pro
dev.to·3h·
Discuss: DEV
🕸️Mesh Networks
Quality Precision
lesswrong.com·1d·
Discuss: Hacker News
✅FLAC Verification
Cytonic: Redefining Innovation and Security in Blockchain
dev.to·11h·
Discuss: DEV
🔐PKI Archaeology
The Compass Pattern: How smart documentation architecture saves $0.63M annually
wyrd-technology.com·6h·
Discuss: Hacker News
📚MARC Evolution
Event Catalog — Exploring The Advanced Capabili
medium.com·1d
🏷️Metadata Standards
Route-and-Execute: Auditable Model-Card Matching and Specialty-Level Deployment
arxiv.org·15h
🦋Format Metamorphosis
Nevada forced to close state government offices following wide-ranging 'network security incident' - here's what we know
techradar.com·2h
🛡Cybersecurity
Using Gemini CLI as a Subagent for Claude Code
aicodingtools.blog·1d·
Discuss: Hacker News
⚡Proof Automation
Adaptive DDoS Mitigation via Hyper-Dimensional Signature Correlation & Dynamic Recursion
dev.to·2d·
Discuss: DEV
👁️Observatory Systems
Formal verification effort for the ABDK Math 64.64 library using echidna/hevm
github.com·1d·
Discuss: Hacker News
✅Format Verification
Model-based Testing Distributed Systems with P Language (2021)
mydistributed.systems·4h·
Discuss: Lobsters, Hacker News, r/programming
📞Session Types
Loading...Loading more...
AboutBlogChangelogRoadmap