🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

The Prehistoric Sepulcher of Huerta Montero in Almendralejo, Spain
atlasobscura.com·4h
🗝️Paleocryptography
TypeScript Cookbook • Stefan Baumgartner & Peter Kröner
youtube.com·1d
🎯Gradual Typing
Blast from the past: Facit A2400 terminal
jpmens.net·1d·
Discuss: Lobsters, Hacker News
💾vintage computing
Inquiries-Week 4: Triangulate the Triangle
fractalkitty.com·17h·
Discuss: Hacker News
📊Computational Geometry
How to design a DBMS for Telco requirements
mikaelronstrom.blogspot.com·1h·
Discuss: Hacker News
🌊Streaming Databases
Hacker and Physicist – A Tale of "Common Sense"
supasaf.com·5d·
Discuss: Hacker News
🔓Hacking
Which is the stronger password? g72$l#pT9a or –.COW
ianmccloy.com·2d·
Discuss: Hacker News
🔓Password Cracking
Wubular: Rubular Reimagined in Ruby+WASM
rubyelders.com·1d·
Discuss: Hacker News
🌀Brotli Internals
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed
guptadeepak.com·10h·
Discuss: DEV, Hacker News
🔐Capability Systems
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.to·1d·
Discuss: DEV
🔗Hash Chains
Positional Embeddings in Transformers: A Math Guide to RoPE & ALiBi
towardsdatascience.com·1d
📐Geometric Hashing
The Art & Science of Crypto Market Making: Inside Kairon Labs
hackernoon.com·9h
🔗Hash Chains
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.org·12h
🔍Vector Forensics
Why and how we built Vectroid, the fastest Serverless vector database
vectroid.com·10h·
Discuss: Hacker News
🗂️Vector Databases
How AI Retrieves Anatomical Structures Using Vector Databases
hackernoon.com·7h
🗂️Vector Search
I built a production app in a week by managing a swarm of 20 AI agents
zachwills.net·15m·
Discuss: Hacker News
🤖Network Automation
More on seed phrase words
johndcook.com·1d·
Discuss: Hacker News
🔍BitFunnel
Nx compromised: malware uses Claude code CLI to explore the filesystem
semgrep.dev·4h·
Discuss: Lobsters, Hacker News
🔍Binary Forensics
Hashlock Launches Free AI Audit Tool for Smart Contracts
aiaudit.hashlock.com·1d·
Discuss: Hacker News
⚡Proof Automation
Using information theory to solve Mastermind
goranssongaspar.com·3d·
Discuss: Hacker News
🧮Kolmogorov Bounds
Loading...Loading more...
AboutBlogChangelogRoadmap