๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Coherent bunching of anyons and dissociation in an interference experiment
nature.comยท1d
โš›๏ธQuantum Channels
Flickr Foundation goes Dutch!
flickr.orgยท2h
๐Ÿ›Digital humanities
Cactus Language โ€ข Syntax 12
inquiryintoinquiry.comยท1d
๐Ÿ“Concrete Syntax
Which operating system was targeted by the first ever mobile phone virus?
techspot.comยท23h
๐Ÿ”“Hacking
Comparing the American and Chinese 0day Pipelines
news.risky.bizยท15h
๐Ÿ”“Hacking
7 AI Agent Frameworks for Machine Learning Workflows in 2025
machinelearningmastery.comยท6h
โšกProof Automation
Cyber insurance premiums dropped for the first time in 2024
metacurity.comยท1d
๐Ÿ”“Hacking
Vitaly Kovalev, the Russian hacker who has offices and gives bonuses to his employees
english.elpais.comยท3h
๐Ÿ”“Hacking
Show HN: AI-gent Workflows โ€“ locally reasoning AI Agents
ai-gents.workยท7hยท
Discuss: Hacker News
โšกProof Automation
Navy SEALs, Performance vs. Trust, and AI
mljar.comยท7hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comยท1dยท
Discuss: Substack
๐Ÿฆ€Rust Macros
Encrypt & Decrypt Text Securely in the Browser
dev.toยท14hยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Memory Safety in Web Rust System Zero Cost Secure๏ผˆ1750794401345600๏ผ‰
dev.toยท1dยท
Discuss: DEV
๐Ÿฆ€Rust Borrowing
North Korea - Cyber Threat Actor Profile
cstromblad.comยท1d
๐Ÿ‡ธ๐Ÿ‡ชNordic Cryptography
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgยท14h
๐Ÿ“ƒManuscript Tokenization
Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning
arxiv.orgยท14h
๐Ÿ”’Privacy Preserving
Your Digital Self Is Not Your Own: How Moca Foundation's New Chain Plans to Give You Back Control
hackernoon.comยท7h
๐Ÿ”—Blockchain Archives
20+ Years in Tech: Things We Wish We Knew Sooner โ€ข Daniel Terhorst-North & Kevlin Henney โ€ข GOTO 2024
youtube.comยท6h
๐Ÿ”ŒInterface Evolution
And Now Malware That Tells AI to Ignore It?
darkreading.comยท21h
๐Ÿ”“Hacking
Real-world performance comparison of ebtree/cebtree/rbtree
wtarreau.blogspot.comยท3dยท
Discuss: wtarreau.blogspot.com, Hacker News
๐ŸŒฒB-tree Variants
Loading...Loading more...
AboutBlogChangelogRoadmap