๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”‘ Cryptographic Protocols

COSE Implementation, Protocol Security, Key Exchange, Authentication

On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations
arxiv.orgยท6h
๐Ÿ”Quantum Security
How to actually use Model Context Protocol
seangoedecke.comยท10h
โšกProof Automation
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท3d
๐ŸŒDNS Security
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.beยท21h
๐Ÿ“กBluetooth Archaeology
A distributed systems reliability glossary
antithesis.comยท1dยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
Building Production-Grade Network Telemetry: A gRPC Journey Into the Heart of Network Monitoring
dev.toยท14hยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
Blog - Hey Signal! Great Encryption Needs Great Authentication
sequoia-pgp.orgยท22h
๐ŸŽฏNTLM Attacks
A Wide Reduction Trick (2022)
words.filippo.ioยท8hยท
Discuss: Lobsters, Hacker News
๐ŸŒณArchive Merkle Trees
Opening a Six-Lock Safe With One Key Using Brunnian Links
hackaday.comยท11h
๐Ÿ”“Password Cracking
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท20h
๐Ÿ”“Password Cracking
Why 1Password hasn't released an MCP server
blog.1password.comยท9hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Netbox MCP Server
rogerperkin.co.ukยท1h
๐ŸšNordic Shell
Go interfaces and json.Unmarshal
fbrs.ioยท15h
๐Ÿ”งBinary Parsers
Async BOFs โ€“ โ€œWake Me Up, Before You Go Goโ€
outflank.nlยท23h
๐Ÿ”eBPF
FSM Library for Embedded C Projects
hackster.ioยท3d
๐Ÿฆ€Embedded Rust
Another critical vulnerability in Cisco's ISE
heise.deยท2h
๐Ÿ”“Hacking
Unmoved Centre - NixOS Secrets Management
unmovedcentre.comยท1d
โ„Nix
Checking data integrity
eclecticlight.coยท1d
โœ…Checksum Validation
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.ilยท1dยท
Discuss: Hacker News
๐ŸŽฏInteractive Provers
Loading...Loading more...
AboutBlogChangelogRoadmap