🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

An OCC Idea
lambdacreate.com·19h
🗄️Database Internals
I Figured Out What the Voynich Manuscript Says; It's Something More Than Words
dmerullo.substack.com·17h·
Discuss: Substack
🏰Manuscript Networks
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
Data Has No Moat!
towardsdatascience.com·1d
🏺Database Archaeology
RepuNet: A Reputation System for Mitigating Malicious Clients in DFL
arxiv.org·3h
🔍BitFunnel
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.com·17h·
Discuss: Substack
🦀Rust Macros
Probing AI Safety with Source Code
arxiv.org·3h
✨Effect Handlers
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.to·2d·
Discuss: DEV
🔓Password Cracking
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography
dev.to·3d·
Discuss: DEV
🔐Quantum Security
Beyond Frameworks: How Computer Science Fundamentals Forge the Complete Developer
dev.to·17h·
Discuss: DEV
📏Code Metrics
The Internal Inconsistency of Large Language Models
blog.kortlepel.com·1d·
Discuss: Hacker News
💻Local LLMs
4-input 2-output Boolean circuits (2020)
cp4space.hatsya.com·2d·
Discuss: Hacker News
⚙️Logic Synthesis
Connect Claude AI with Obsidian: A Game-Changer for Knowledge Management 🚀
dev.to·1d·
Discuss: DEV
🤖Archive Automation
Writing Toy Software Is a Joy
quiz.businessexplain.com·4h·
Discuss: Hacker News
🔩Systems Programming
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·23h
🔓Hacking
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.to·10h·
Discuss: DEV
🔗Data Provenance
Encrypt & Decrypt Text Securely in the Browser
dev.to·3h·
Discuss: DEV
🛡️WASM Security
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org·3h
📃Manuscript Tokenization
Memory Safety in Web Rust System Zero Cost Secure(1750794401345600)
dev.to·1d·
Discuss: DEV
🦀Rust Borrowing
Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning
arxiv.org·3h
🔒Privacy Preserving
Loading...Loading more...
AboutBlogChangelogRoadmap