๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ฆ Content Addressing

Hash-based Storage, Git Internals, IPFS, Deduplication Systems

Could Open Table Formats End the Reign of Snowflake and Databricks?
prequel.coยท42mยท
Discuss: Hacker News
๐Ÿ“šMARC Evolution
Slashing CI Costs at Uber
uber.comยท8hยท
Discuss: Hacker News
๐Ÿ”„Reproducible Builds
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgยท1d
๐Ÿฆ Malware Analysis
Design, Implementation, and Analysis of Fair Faucets for Blockchain Ecosystems
arxiv.orgยท1d
๐ŸคDistributed Consensus
in and out, quick appview adventure | futur | WhiteWind blog
whtwnd.comยท9h
๐Ÿ”„Sync Engine
Memory Safety in Web Rust System Zero Cost Secure๏ผˆ1750794401345600๏ผ‰
dev.toยท22hยท
Discuss: DEV
๐Ÿฆ€Rust Borrowing
How keys are used in FileVault and encryption
eclecticlight.coยท11hยท
Discuss: Lobsters, Hacker News
๐Ÿ’ฃCompression Security
Show HN: Blockdiff โ€“ How we built our own file format for VM disk snapshots
cognition.aiยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ’ฟZFS Internals
Kafka Fundamentals: kafka retention.ms
dev.toยท8hยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comยท1d
๐ŸŽซKerberos Exploitation
CloneDex: Rebuilding OpenAI Codex with VibeKit
vibekit.shยท7hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท6h
๐Ÿฆ Malware Analysis
Remote code execution in CentOS Web Panel โ€“ CVE-2025-48703
fenrisk.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Inspecting Service Traffic with mirrord dump
metalbear.coยท8hยท
Discuss: Lobsters, Hacker News
๐Ÿ”eBPF
The Case for Native Iceberg Catalog APIs and Unified Governance in Object Storage
blog.min.ioยท2d
๐Ÿท๏ธMetadata Standards
Envoy Proxy Is a Swiss Army Knife
adityarohilla.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgยท16hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Using a Bloom Filter to Anonymize Web Server Logs
jamieweb.netยท2dยท
Discuss: Hacker News
๐ŸŒธBloom Filters
SSL and TLS Deployment Best Practices
github.comยท19hยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lolยท1dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap