๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Cactus Language โ€ข Syntax 12
inquiryintoinquiry.comยท1d
๐Ÿ“Concrete Syntax
Which operating system was targeted by the first ever mobile phone virus?
techspot.comยท1d
๐Ÿ”“Hacking
7 AI Agent Frameworks for Machine Learning Workflows in 2025
machinelearningmastery.comยท11h
โšกProof Automation
Cyber insurance premiums dropped for the first time in 2024
metacurity.comยท1d
๐Ÿ”“Hacking
Comparing the American and Chinese 0day Pipelines
news.risky.bizยท20h
๐Ÿ”“Hacking
Vitaly Kovalev, the Russian hacker who has offices and gives bonuses to his employees
english.elpais.comยท8h
๐Ÿ”“Hacking
Show HN: AI-gent Workflows โ€“ locally reasoning AI Agents
ai-gents.workยท11hยท
Discuss: Hacker News
โšกProof Automation
Navy SEALs, Performance vs. Trust, and AI
mljar.comยท12hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgยท19h
๐Ÿ“ƒManuscript Tokenization
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.toยท3dยท
Discuss: DEV
๐Ÿ”“Password Cracking
Client Clustering Meets Knowledge Sharing: Enhancing Privacy and Robustness in Personalized Peer-to-Peer Learning
arxiv.orgยท19h
๐Ÿ”’Privacy Preserving
Your Digital Self Is Not Your Own: How Moca Foundation's New Chain Plans to Give You Back Control
hackernoon.comยท12h
๐Ÿ”—Blockchain Archives
20+ Years in Tech: Things We Wish We Knew Sooner โ€ข Daniel Terhorst-North & Kevlin Henney โ€ข GOTO 2024
youtube.comยท11h
๐Ÿ”ŒInterface Evolution
And Now Malware That Tells AI to Ignore It?
darkreading.comยท1d
๐Ÿ”“Hacking
Real-world performance comparison of ebtree/cebtree/rbtree
wtarreau.blogspot.comยท4dยท
Discuss: wtarreau.blogspot.com, Hacker News, r/programming
๐ŸŒฒB-tree Variants
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing Oracle for DeFi
arxiv.orgยท1d
๐Ÿ”—Hash Chains
A Geometric Square-Based Approach to RSA Integer Factorization
arxiv.orgยท2d
๐Ÿ”ฑGalois Cryptography
AI Agents Can Now Pay Autonomously Thanks to x402 and HTTP 402
hackernoon.comยท15h
๐Ÿ”ŒInterface Evolution
Privacy-Preserving LLM Interaction with Socratic Chain-of-Thought Reasoning and Homomorphically Encrypted Vector Databases
arxiv.orgยท2d
๐Ÿ”Homomorphic Encryption
Cisco fixed critical ISE flaws allowing Root-level remote code execution
securityaffairs.comยท10h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap