🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Papyrus: The AI writing assistant that helps you create better writing faster
papyruswriter.ai·19h·
Discuss: Hacker News
📄PostScript
Apple Silicon USB3 Support [RFC]
lore.kernel.org·2d·
Discuss: Hacker News
🔌Operating system internals
Former TLM that was involuntarily reclassified as an EM because I had too many r... | Hacker News
news.ycombinator.com·1d·
Discuss: Hacker News
🔩Systems Programming
Building a Plugin System for Rust: Native Libraries vs Scripting Language vs WASM vs Rules Engine
kerkour.com·2d·
Discuss: Hacker News
🦀Rust Macros
'Isn't Designed to Solve Privacy Concerns,' Grafana CTO on Bring Your Own Cloud
theregister.com·16h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Fuzzy file picker for tmux and Claude Code
github.com·13h·
Discuss: Hacker News
🤖Archive Automation
Measuring Reasoning Utility in LLMs via Conditional Entropy Reduction
arxiv.org·5h
🧠Intelligence Compression
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blog·3d·
Discuss: Lobsters, Hacker News, r/programming
🔑Cryptographic Protocols
How I Write 2,000+ Words a Day with AI
dev.to·5h·
Discuss: DEV
⚡Proof Automation
Reality Check: AI Isn’t Replacing Engineers, It’s Scaffolding
dev.to·18h·
Discuss: DEV
⚙️Proof Engineering
Rao Differential Privacy
arxiv.org·3d
🛡️Differential Privacy
SUMMA: A Multimodal Large Language Model for Advertisement Summarization
arxiv.org·5h
🔍Information Retrieval
U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·1d
🔓Hacking
Geopolitical Parallax: Beyond Walter Lippmann Just After Large Language Models
arxiv.org·1d
🚀SIMD Text Processing
Tencent Cloud sites breached to expose valuable data - here's what we know
techradar.com·1d
🔓Hacking
Electronics manufacturer Data I/O took offline operational systems following a ransomware attack
securityaffairs.com·4d
🛡Cybersecurity
How Amazon Finance built an AI assistant using Amazon Bedrock and Amazon Kendra to support analysts for data discovery and business insights
aws.amazon.com·13h
🤖AI Curation
🔥Firebase vs ⚡Supabase in 2025: Which one actually scales with 🫵 you?
dev.to·23h·
Discuss: DEV
🔄Sync Engine
Obsidian, Notion, Logseq?! The note-taking stack that doesn’t suck for devs
dev.to·22h·
Discuss: DEV
📦Git LFS
The Champions League gets a hipster makeover
theguardian.com·1d
📰RSS Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap