🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Checksum Validation

SHA-256, MD5, Data Integrity, Error Detection

Fair Data Exchange with Constant-Time Proofs
arxiv.org·1d
🌳Archive Merkle Trees
Shooting Bugs-in-a-Barrel with AI-Driven Binary Analysis on a Totolink Router
prizmlabs.io·1d·
Discuss: Hacker News
🧪CBOR Fuzzing
An unfinished post: "Compressing short Unicode strings with BOCU-1"
evanhahn.com·1d
🔤Character Encoding
RaptorCast: Designing a Messaging Layer
category.xyz·1d·
Discuss: Hacker News
🤝Distributed Consensus
The Critical Importance of Security in the Digital Age(1750215879044400)
dev.to·2d·
Discuss: DEV
✅Archive Fixity
Roundcube: CVE-2025–49113
infosecwriteups.com·1d
🔓Hacking
What’s the Difference Between Authenticity and Non-Repudiation in Cybersecurity?
securityscorecard.com·20h
🌳Archive Merkle Trees
Pennybase: a Pound-Shop BaaS
zserge.com·3d
✅Format Validation
TxTag Takedown: Busting Phishing Email Schemes
cofense.com·1d
🌐BGP Security
Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA
news.risky.biz·2h
🔓Hacking
My first experience with Formal Methods | ZipCPU
zipcpu.com·21h
🔧Hardware Verification
graven-image: Portability library for CL image in REPL
github.com·12h·
Discuss: Lobsters
🦀Rust Macros
Disaster Recovery with ZFS: A Practical Guide
discoverbsd.com·1h
🗄️File Systems
Linters, Formatters, and Type-Checkers
playfulprogramming.com·1d
🎯Gradual Typing
The Consumer Authentication Strength Maturity Model (Casmm) V6
danielmiessler.com·12h·
Discuss: Hacker News
🔐Capability Systems
SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)
seclists.org·2d
🌐NetworkProtocols
Recent optimizations on integer to string conversions
reddit.com·16h·
Discuss: r/rust
🧮Algebraic Datatypes
Akamai Web Application Firewall – How It Works
axonshield.com·10h·
Discuss: Hacker News
🕵️Network Forensics
Two Sum in C# – From Brute Force to Optimal Hash Map & Beyond
dev.to·1d·
Discuss: DEV
📐Error Bounds
OWASP Top for Business Logic Abuse
owasp.org·16h·
Discuss: Hacker News
🔒WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap