🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Cryptographic Archaeology

Historical Ciphers, Algorithm Evolution, Security Heritage, Cipher Recovery

Cactus Language • Syntax 12
inquiryintoinquiry.com·1d
📝Concrete Syntax
Which operating system was targeted by the first ever mobile phone virus?
techspot.com·1d
🔓Hacking
An OCC Idea
lambdacreate.com·1d
🗄️Database Internals
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·2d
🔐Quantum Security
Vitaly Kovalev, the Russian hacker who has offices and gives bonuses to his employees
english.elpais.com·13h
🔓Hacking
How People Use Claude for Support, Advice, and Companionship
anthropic.com·3h·
Discuss: Hacker News
🤖Grammar Induction
The Whole Code Catalog
futureofcoding.org·13h·
Discuss: Hacker News
🔗Concatenative Programming
4-input 2-output Boolean circuits (2020)
cp4space.hatsya.com·2d·
Discuss: Hacker News
⚙️Logic Synthesis
Data Has No Moat!
towardsdatascience.com·2d
🏺Database Archaeology
Slightly better named character reference tokenization than Chrome, Safari, and Firefox
ryanliptak.com·1d·
Discuss: Lobsters, Hacker News
🌳Trie Structures
Should you buy a smart lock or stick with your keys? Weighing up the pros and cons of connected security
techradar.com·19h
🏠Home Automation
Real-world performance comparison of ebtree/cebtree/rbtree
wtarreau.blogspot.com·4d·
Discuss: wtarreau.blogspot.com, Hacker News, r/programming
🌲B-tree Variants
Cisco fixed critical ISE flaws allowing Root-level remote code execution
securityaffairs.com·15h
🔓Hacking
Design high-confidence computers using trusted instructional set architecture and emulators
arxiv.org·2d
🧪Hardware Fuzzing
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Fast entropy-regularized SDP relaxations for permutation synchronization
arxiv.org·23h
🎯Performance Proofs
Memory Safety in Web Rust System Zero Cost Secure(1750762127113200)
dev.to·2d·
Discuss: DEV
🦀Rust Borrowing
Writing Toy Software Is a Joy
quiz.businessexplain.com·1d·
Discuss: Hacker News
🔩Systems Programming
👹 Longest Binary Subsequence K – LeetCode 2311 (C++ | JavaScript | Python )
dev.to·1d·
Discuss: DEV
λLambda Encodings
Flame Graph Performance Truth Analysis(1750991459477100)
dev.to·1h·
Discuss: DEV
⚡Performance Tools
Loading...Loading more...
AboutBlogChangelogRoadmap