🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”‘ Cryptographic Protocols

COSE Implementation, Protocol Security, Key Exchange, Authentication

Russia targets WhatsApp and pushes new β€˜super-app’ as internet blackouts grow
madcornishprojectionist.co.ukΒ·2d
πŸ”Soviet Cryptography
Claude Code Anonymous
steipete.meΒ·1dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
β€œGoLand Can Do That?” Ten Secret Superpowers You Might Not Know
blog.jetbrains.comΒ·2dΒ·
Discuss: Hacker News
πŸ”“Reverse engineering
Bridging the real-time testing gap: Fanout support in local development for Fastly Compute
fastly.comΒ·2d
🌊Stream Processing
TailGuard: A way to connect your home WireGuard router into Tailscale via Docker
github.comΒ·1dΒ·
Discuss: Hacker News, Hacker News
πŸ“¦Container Security
UK toughens Online Safety Act with ban on self-harm content
theregister.comΒ·1dΒ·
Discuss: Hacker News
πŸ›‘Cybersecurity
From Tokens to Theorems: Building a Neuro-Symbolic AI Mathematician
towardsdatascience.comΒ·2d
πŸ“Mathematical Art
AI Algae Farms: Reinforcement Learning Revolutionizes Biofuel Production by Arvind Sundararajan
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”²Cellular Automata
This creepy spyware watches you through your webcam and snaps incriminating photos
techradar.comΒ·2d
πŸš€Indie Hacking
Multi-EuP: The Multilingual European Parliament Dataset for Analysis of Bias in Information Retrieval
arxiv.orgΒ·1d
πŸ“ŠMulti-vector RAG
The Critical Failure in Vulnerability Management
darkreading.comΒ·2d
πŸ”“Hacking
The maths you need to start understanding LLMs
dev.toΒ·4dΒ·
Discuss: DEV
πŸ’»Local LLMs
Every moment is special: My Wikimania@20 Nairobi journey
diff.wikimedia.orgΒ·11h
🌱Personal Wikis
Apple's Final Cut Camera 2.0 to Support ProRes RAW and Genlock
macrumors.comΒ·11h
🍎Apple Archive
MIND Technology, Inc. (MIND) Q2 2026 Earnings Call Transcript
seekingalpha.comΒ·5h
🌊Stream Processing
Insmed Incorporated (INSM) Presents At Morgan Stanley 23rd Annual Global Healthcare Conference Transcript
seekingalpha.comΒ·5h
πŸ”—Data Provenance
AI-Powered SEO Research Agent with OpenAI & SerpApi
dev.toΒ·8hΒ·
Discuss: DEV
πŸ“ŠFeed Optimization
Repeating vs. Non-Repeating FRBs: A Deep Learning Approach To Morphological Characterization
arxiv.orgΒ·1d
🧠Machine Learning
Hackers breached Salesloft ’s GitHub in March, and used stole tokens in a mass attack
securityaffairs.comΒ·2d
🎫Kerberos Attacks
Critical SAP S/4HANA vulnerability is attacked
heise.deΒ·2d
πŸ”“LDAP Injection
Loading...Loading more...
AboutBlogChangelogRoadmap