🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚡ Dependent Rust

Verification, Type-level Programming, Safety Proofs, Linear Types

Live: Warriors try to snap losing streak and retake NRL top four spot
abc.net.au·18h
📰RSS Archaeology
Function Colors Represent Different Execution Contexts
danieltan.weblog.lol·5d·
Discuss: r/programming
✨Effect Handlers
Trying Out the New Android Linux Terminal
deepakness.com·1d·
Discuss: Hacker News
📟Terminals
Why Remediation Is the Hardest Problem in NHI Security
token.security·1d·
Discuss: Hacker News
🔐Capability Systems
Book Review: The Math Academy Way
ijfen.substack.com·1d·
Discuss: Substack
📚Proof Pedagogy
Will Waymo car be the star of San Jose Chamber of Commerce BBQ?
mercurynews.com·1d
💻Local first
Simple Claude Code Review Prompt
josecasanova.com·3d·
Discuss: Hacker News
🦀Rust Macros
Running Guitar Effects on a PlayStation Portable
hackaday.com·2d
🎵Gameboy Sound
Guess what else GPT-5 is bad at? Security
cyberscoop.com·3d
🔓Hacking
Insights from the Algonauts 2025 Winners
arxiv.org·14h
🤖AI Curation
Who Should Handle Your Digital ID?
hackernoon.com·2d
🔐PKI Archaeology
Bistochastically private release of longitudinal data
arxiv.org·14h
🛡️Differential Privacy
Back to the basics: Minimal genomes yield viable plants for biotech applications
phys.org·2d
🧬Copy Number Variants
Why Flexprice Picked Go From Day One And Never Looked Back
dev.to·1d·
Discuss: DEV
🌊Streaming Systems
Automated Defect Classification in Wafer Fabrication via Multi-Modal Data Fusion and Graph Neural Networks
dev.to·2d·
Discuss: DEV
📄Document Digitization
Secure chat darling Matrix admits pair of 'high severity' protocol flaws need painful fixes
theregister.com·2d·
Discuss: Hacker News
🔓Hacking
Adaptive Optimization of Time-Sensitive Network (TSN) Protocols via Reinforcement Learning and Dynamic Signal Shaping
dev.to·1d·
Discuss: DEV
📡Network Calculus
What Medieval People Got Right About Learning (2019)
scotthyoung.com·1d·
Discuss: Hacker News
📚Proof Pedagogy
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation
arxiv.org·3d
🎯Threat Hunting
DiffPose-Animal: A Language-Conditioned Diffusion Framework for Animal Pose Estimation
arxiv.org·2d
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap