Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Distributed Hash
Chord Protocol, P2P Networks, Consistent Hashing, DHT Routing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24461
posts in
25.0
ms
Beyond the spike: building resilient and
trusted
infrastructure in an era of
sustained
attacks
🌐
Network Security
techradar.com
·
2d
·
…
P2P
from Scratch — Part 1: The Internet is
Hostile
📞
WebRTC
pears.com
·
1h
·
Hacker News
·
…
The
Cryptopals
Crypto Challenges
🔗
Hash Chains
cryptopals.com
·
4d
·
Hacker News
·
…
Proof-Carrying
Border
Gateway
Protocol
📡
Network Protocol Design
rot256.dev
·
17h
·
Hacker News
·
…
Optimising
Blockchain
Scalability
for Real-Time IoT Applications
🤝
Distributed Consensus
arxiv.org
·
2d
·
…
The "Stop-the-World" Problem: How I
Rebuilt
My Database's Core to Kill 200ms Latency
Spikes
🗄️
Database Internals
veniatyrannus993225.substack.com
·
18h
·
Substack
·
…
Peer-to-peer sync for a reading app with mTLS,
CRDTs
, and
HLCs
🔌
Offline-first Apps
tech.stonecharioteer.com
·
6d
·
Hacker News
,
r/programming
·
…
Database
Sharding
in System Design
🗄️
Database Sharding
codewithdhanian.gumroad.com
·
1d
·
DEV
·
…
Web
PKI
Reimagined with
Merkle
Tree Certificates
🔐
PKI Archaeology
feistyduck.com
·
1d
·
Lobsters
·
…
viftode4/trustchain
:
TrustChain
- decentralized trust for AI agents. Rust core, QUIC P2P, transparent proxy, MCP server, dashboard
🌳
Archive Merkle Trees
github.com
·
6d
·
Hacker News
·
…
Ask HN: A
Decentralized
Proof-of-Aliveness
?
🤝
Distributed Consensus
news.ycombinator.com
·
3d
·
Hacker News
·
…
IronFleet
:
proving
practical distributed systems correct
⚔️
Lean Tactics
youtube.com
·
4d
·
Lobsters
·
…
Implementing Amazon
Dynamo
in
Elixir
🤝
Consensus Protocols
jitesh117.github.io
·
6d
·
Hacker News
·
…
Community as a
Distribution
Growth Engine
🎯
Content Recommendation
hackernoon.com
·
3d
·
…
Securing
Elliptic
Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and
Mitigations
🔐
Quantum Security
arxiv.org
·
1d
·
…
Decentralized Proof-of-Location for Content
Provenance
: Towards Capture-Time
Authenticity
🔐
PKI Archaeology
arxiv.org
·
2d
·
…
Tell HN: We built our own SAT
solver
for
SHA-256
🔐
Hash Functions
news.ycombinator.com
·
4d
·
Hacker News
·
…
predatorray/dandelion-mesh
: Serverless mesh network for browsers using WebRTC. Connect, broadcast, and sync state without a central server.
📞
WebRTC
github.com
·
5d
·
Hacker News
·
…
Distributed Quantum
Discrete
Logarithm
Algorithm
⚛️
Quantum Algorithms
arxiv.org
·
3d
·
…
Integration
Adapter
Architecture for Food
Traceability
Blockchain
🔌
Interface Evolution
arxiv.org
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help