🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Cactus Language β€’ Syntax 12
inquiryintoinquiry.comΒ·21h
πŸ“Concrete Syntax
Which operating system was targeted by the first ever mobile phone virus?
techspot.comΒ·19h
πŸ”“Hacking
An OCC Idea
lambdacreate.comΒ·1d
πŸ—„οΈDatabase Internals
Maturing your smart contracts beyond private key risk
blog.trailofbits.comΒ·2d
πŸ”Quantum Security
Navy SEALs, Performance vs. Trust, and AI
mljar.comΒ·2hΒ·
Discuss: Hacker News
🎯Threat Hunting
Show HN: AI-gent Workflows – locally reasoning AI Agents
ai-gents.workΒ·2hΒ·
Discuss: Hacker News
⚑Proof Automation
Data Has No Moat!
towardsdatascience.comΒ·1d
🏺Database Archaeology
4-input 2-output Boolean circuits (2020)
cp4space.hatsya.comΒ·2dΒ·
Discuss: Hacker News
βš™οΈLogic Synthesis
Writing Toy Software Is a Joy
quiz.businessexplain.comΒ·10hΒ·
Discuss: Hacker News
πŸ”©Systems Programming
Optimizing Change-Driven Architectures - A New Cloud-Native Model with Drasi
youtube.comΒ·6h
⚑Incremental Computation
The Internal Inconsistency of Large Language Models
blog.kortlepel.comΒ·1dΒ·
Discuss: Hacker News
πŸ’»Local LLMs
Should you buy a smart lock or stick with your keys? Weighing up the pros and cons of connected security
techradar.comΒ·5h
🏠Home Automation
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toΒ·16hΒ·
Discuss: DEV
πŸ”—Data Provenance
Encrypt & Decrypt Text Securely in the Browser
dev.toΒ·9hΒ·
Discuss: DEV
πŸ›‘οΈWASM Security
North Korea - Cyber Threat Actor Profile
cstromblad.comΒ·19h
πŸ‡ΈπŸ‡ͺNordic Cryptography
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgΒ·9h
πŸ“ƒManuscript Tokenization
Memory Safety in Web Rust System Zero Cost Secure(1750794401345600οΌ‰
dev.toΒ·1dΒ·
Discuss: DEV
πŸ¦€Rust Borrowing
Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning
arxiv.orgΒ·9h
πŸ”’Privacy Preserving
20+ Years in Tech: Things We Wish We Knew Sooner β€’ Daniel Terhorst-North & Kevlin Henney β€’ GOTO 2024
youtube.comΒ·1h
πŸ”ŒInterface Evolution
Real-world performance comparison of ebtree/cebtree/rbtree
wtarreau.blogspot.comΒ·3dΒ·
Discuss: wtarreau.blogspot.com, Hacker News
🌲B-tree Variants
Loading...Loading more...
AboutBlogChangelogRoadmap