Feeds to Scour
SubscribedAll
The Quest to Replace Passwords: a comparative evaluation of Web authn schemes
cl.cam.ac.ukยท5hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Preview
Report Post
Cryptanalysis of Gleeok-128
arxiv.orgยท2d
๐ŸŒŠStream Ciphers
Preview
Report Post
Cryptography for the Everyday Developer: Understanding RSA
sookocheff.comยท2d
๐Ÿ”Homomorphic Encryption
Preview
Report Post
Inside Shanya, a packer-as-a-service fueling modern attacks
news.sophos.comยท19h
๐ŸบZIP Archaeology
Preview
Report Post
Multiplying our way out of division
xania.orgยท11h
๐Ÿ“Interval Arithmetic
Preview
Report Post
Theory and AI Alignment
scottaaronson.blogยท17h
๐Ÿ”ฒCellular Automata
Preview
Report Post
The significance of Brooker's autocodes in taking the early Manchester machines
curation.cs.manchester.ac.ukยท1hยท
Discuss: Hacker News
๐Ÿ‡ฌ๐Ÿ‡งBritish Computing
Preview
Report Post
Research Worth Reading Week 49/2025
pentesterlab.comยท16m
๐Ÿ”Archive Cryptanalysis
Preview
Report Post
Security Affairs newsletter Round 553 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท4h
๐Ÿ›กCybersecurity
Preview
Report Post
What is a Pedersen commitment?
johndcook.comยท1d
๐Ÿ”Quantum Security
Preview
Report Post
Weekly Bookmarks
inkdroid.orgยท17h
๐ŸŒ€Brotli Internals
Preview
Report Post
Mapping the Tor darkmarket ecosystem: A network analysis of topics, communication channels, and languages
sciencedirect.comยท11h
๐Ÿง…Tor Networks
Preview
Report Post
CISOs Should Be Asking These Quantum Questions Today
darkreading.comยท2d
๐Ÿ”Quantum Security
Preview
Report Post
Breadboards that are set up on my desk right now
circusscientist.comยท7h
โš™๏ธTape Mechanics
Preview
Report Post
Beyond Basic RAG: 3 Advanced Architectures I Built to Fix AI Retrieval
vibe.forem.comยท12hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Preview
Report Post
How to Build an LLM-Powered Database Query Bot for Your Web App in 1 Day
semicolonandsons.comยท11hยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
Preview
Report Post
What Got Lost in the Optimization
medium.comยท21h
๐ŸŒCultural Algorithms
Preview
Report Post
A series of tricks and techniques I learned doing tiny GLSL demos
blog.pkh.meยท5h
๐Ÿ“ŸTerminal Physics
Preview
Report Post
React2Shell Exploitation: A Short Summary of Honeypot Activity
defusedcyber.comยท4hยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
Preview
Report Post
Day 57: Python GCD & LCM with Euclidean Algorithm, Lightning-Fast Divisor Math That's 2000+ Years Old (And Still Unbeatable)
dev.toยท14hยท
Discuss: DEV
๐Ÿ“Interval Arithmetic
Preview
Report Post