🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

The Prehistoric Sepulcher of Huerta Montero in Almendralejo, Spain
atlasobscura.com·14h
🗝️Paleocryptography
TypeScript Cookbook • Stefan Baumgartner & Peter Kröner
youtube.com·1d
🎯Gradual Typing
Blast from the past: Facit A2400 terminal
jpmens.net·2d·
Discuss: Lobsters, Hacker News
💾vintage computing
Why and how we built Vectroid, the fastest Serverless vector database
vectroid.com·20h·
Discuss: Hacker News
🗂️Vector Databases
More on seed phrase words
johndcook.com·1d·
Discuss: Hacker News
🔍BitFunnel
Qwiet AI Extends Microsoft Support in Platform for Fixing Vulnerabilities
devops.com·16h
🧪Protocol Fuzzing
The Hexagon: A Battle-Tested Blueprint for Your Event-Driven App
mina-tafreshi.medium.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Sotasearch.ai – privacy-first research assistant (100% local)
sotasearch.ai·16h·
Discuss: Hacker News
🤖Archive Automation
Implementing Forth in Go and C
eli.thegreenplace.net·22h·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
🔗Concatenative Programming
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·2d·
Discuss: Hacker News
🔱Galois Cryptography
Latest Prisma ORM release has guardrails to prevent AI from nuking your db
github.com·11h·
Discuss: Hacker News
🛡️CLI Security
Learning Perl in one day and the importance of building strong foundations
guilhermenl.dev·14h·
Discuss: Hacker News
🔗Concatenative Programming
Stop “vibe testing” your LLMs. It's time for real evals.
developers.googleblog.com·9h·
Discuss: Hacker News
📏Code Metrics
The first AI-powered ransomware has been spotted - and here's why we should all be worried
techradar.com·6h
🚀Indie Hacking
FLAegis: A Two-Layer Defense Framework for Federated Learning Against Poisoning Attacks
arxiv.org·22h
🤐Secure Multiparty
Data Science Path: Automatic Subclass Registration & Python Encryption Algorithms with LabEx
dev.to·5d·
Discuss: DEV
📊APL Heritage
Applying KISS, DRY, and LOD Principles in Go
dev.to·2h·
Discuss: DEV
⚖️Hoare Logic
Demystifying Go Mutex: How Synchronization Works Under the Hood
dev.to·13h·
Discuss: DEV
🧠Separation Logic
SOC-CERT: Automated Threat Intelligence System with n8n & AI
dev.to·13h·
Discuss: DEV
🏠Homelab Pentesting
Hyper-Wordle strategies
chriskw.xyz·3d·
Discuss: Hacker News
🌳Trie Structures
Loading...Loading more...
AboutBlogChangelogRoadmap