๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Cactus Language โ€ข Syntax 12
inquiryintoinquiry.comยท4h
๐Ÿ“Concrete Syntax
Tom Oldroyd From Semantics 21 On Protecting Investigators And Reducing CSAM Exposure
forensicfocus.comยท1d
๐Ÿ”ฌArchive Forensics
Coherent bunching of anyons and dissociation in an interference experiment
nature.comยท3h
โš›๏ธQuantum Channels
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comยท23h
๐Ÿ”—Data Provenance
Cambridge Cybercrime Conference 2025 โ€“ Liveblog
lightbluetouchpaper.orgยท5h
๐ŸŽฏThreat Hunting
Which operating system was targeted by the first ever mobile phone virus?
techspot.comยท1h
๐Ÿ”“Hacking
XOR Marks the Flaw in SAP GUI
darkreading.comยท7h
๐Ÿ”“Hacking
The one-more-re-nightmare compiler (2021)
applied-langua.geยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”RegEx Engines
How to Quantify Risk and Communicate Effectively: Step 4 to TruRiskโ„ข
blog.qualys.comยท5h
๐ŸŽฏThreat Hunting
Small language model for secrets detection
wiz.ioยท2dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Cyber insurance premiums dropped for the first time in 2024
metacurity.comยท6h
๐Ÿ”“Hacking
Maturing your smart contracts beyond private key risk
blog.trailofbits.comยท1d
๐Ÿ”Quantum Security
DigitalOcean Fundamentals: API
dev.toยท11hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
C++ Seeding Surprises (2015)
pcg-random.orgยท3hยท
Discuss: Hacker News
๐Ÿ”ขBitwise Algorithms
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toยท7hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.comยท6h
๐Ÿฆ Malware Analysis
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.orgยท2d
๐Ÿ”’Language-based security
Show HN: Enigma Machine and Bombe Implemented in eBPF โ€“ Turing's 113th Birthday
github.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Solving LinkedIn Queens Using Haskell
imiron.ioยท1dยท
Discuss: Lobsters, Hacker News, r/programming
ฮปLambda Formalization
Loading...Loading more...
AboutBlogChangelogRoadmap