🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Checksum Validation

SHA-256, MD5, Data Integrity, Error Detection

noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·18h·
Discuss: Hacker News
🔱Galois Cryptography
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.com·1h
✅Format Verification
From Hashes to Signatures: Securing File Transfers with RSA/ECDSA Digital Signatures
dev.to·4d·
Discuss: DEV
🌳Archive Merkle Trees
Security Flaws in the WebMonetization Site
shkspr.mobi·1h·
Discuss: shkspr.mobi
📡Feed Security
Code does not lie
nocomplexity.com·1d
🔒Language-based security
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·17h·
Discuss: Hacker News
✅Format Validation
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·20h·
Discuss: Hacker News
🔐Archive Encryption
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·1d
🔐Quantum Security
It takes 26 yottabytes of RAM to typecheck a union of Safe Integers
playfulprogramming.com·1d
🧪Binary Fuzzing
Claude Code's 19 cent Parser
blogger.com·1d
🔧Binary Parsers
Convenient 'Copy as cURL': explicit, executable, editable request replays
huonw.github.io·13h·
Discuss: Hacker News
🛡️WASM Security
A Bitcoin Core Code Analysis
binaryigor.com·21h·
Discuss: Hacker News
🧬Bitstream Evolution
The Day I Logged in with a Hash
gsociety.fr·1d·
Discuss: Hacker News
🔓Hacking
FLINT: Fast Library for Number Theory
flintlib.org·18h
🧮Algebraic Datatypes
Formal verification effort for the ABDK Math 64.64 library using echidna/hevm
github.com·22h·
Discuss: Hacker News
✅Format Verification
Is this even close to a legit listing?
ebay.co.uk·5h·
Discuss: r/homelab
✅Format Verification
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·23h
🛡Cybersecurity
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·9h
🎯Content Recommendation
Emulating aarch64 in software using JIT compilation and Rust
pitsidianak.is·5h·
Discuss: Lobsters, Hacker News, r/rust
🦾ARM Assembly
Web hosting software cPanel: Updates close security gap
heise.de·1d
🛡️WASM Security
Loading...Loading more...
AboutBlogChangelogRoadmap