🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔑 Cryptographic Protocols

COSE Implementation, Protocol Security, Key Exchange, Authentication

Yubico delivers PIN advancements with new YubiKey 5 – Enhanced PIN keys
yubico.com·1d
🔒Hardware Attestation
Canonical and ESWIN announces EBC77 RISC-V SBC with Ubuntu 24.04 support
cnx-software.com·17h
🔌Operating system internals
New research connects quantum computing power to the security of cryptographic systems
phys.org·1d
🔐Quantum Security
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.com·1d
🧬Bitstream Evolution
Legal Ransomware
aardvark.co.nz·11h
🏴‍☠️Piracy
Petoron Time Burn Cipher (PTBC)
dev.to·12h·
Discuss: DEV
🔐Cryptographic Archaeology
Effective Practices for Coding with a Chat-Based AI
infoq.com·4h·
Discuss: Hacker News
🔄Language Evolution
A PhD's Apology
cappadokes.github.io·15h·
Discuss: Hacker News
🧮Theoretical Computer Science
The Future of AI Agent Communication with ACP
towardsdatascience.com·1d
🔌Interface Evolution
Types That Count: Journey across Qualitative and Quantitative Intersection Types
iris.unito.it·2d·
Discuss: Hacker News
🔍Type Inference
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.com·2d
🤝Distributed Consensus
Pre-disclosure: Upcoming coordinated security fix for all Matrix server implementations
matrix.org·1d·
Discuss: Lobsters, Hacker News
🤝Paxos Consensus
Crates.io Implements Trusted Publishing Support
socket.dev·7h·
Discuss: Hacker News
🌳Archive Merkle Trees
How to generate a TypeScript SDK for your API spec
buildwithfern.com·10h·
Discuss: Hacker News
⚡gRPC
Inside the Ethical Hacker’s Mind: How Pros Make Split-Second Security Decisions
oreilly.com·11h
🔓Hacking
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.org·1d
🎯Threat Hunting
A2A Protocol ADK guide – hands-on demo for building agents
a2aprotocol.ai·1d·
Discuss: Hacker News
🤖Network Automation
Proof by Intimidation
en.wikipedia.org·19h·
Discuss: Hacker News
🎯Proof Tactics
Artisanal Handcrafted Git Repositories
drew.silcock.dev·8h·
Discuss: Lobsters, Hacker News
🌳Git Internals
IRC Networks Under Systematic Attack from Governments (2014)
quakenet.org·10h·
Discuss: Hacker News
🧅Tor Networks
Loading...Loading more...
AboutBlogChangelogRoadmap