Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Distributed Hash
Chord Protocol, P2P Networks, Consistent Hashing, DHT Routing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24037
posts in
19.7
ms
Beyond the spike: building resilient and
trusted
infrastructure in an era of
sustained
attacks
🌐
Network Security
techradar.com
·
3d
·
…
P2P
from Scratch — Part 1: The Internet is
Hostile
📞
WebRTC
pears.com
·
12h
·
Hacker News
·
…
Optimising
Blockchain
Scalability
for Real-Time IoT Applications
🤝
Distributed Consensus
arxiv.org
·
2d
·
…
ryaker/SparrowDB
: Embedded graph database — Cypher queries, no server, no subscription. Rust-native with Python, Node.js & Ruby bindings.
🕸️
Neo4j
github.com
·
10h
·
Hacker News
·
…
Proof-Carrying
Border
Gateway
Protocol
📡
Network Protocol Design
rot256.dev
·
1d
·
Hacker News
·
…
The
Cryptopals
Crypto Challenges
🔗
Hash Chains
cryptopals.com
·
5d
·
Hacker News
·
…
Database
Sharding
in System Design
🗄️
Database Sharding
codewithdhanian.gumroad.com
·
2d
·
DEV
·
…
Web
PKI
Reimagined with
Merkle
Tree Certificates
🔐
PKI Archaeology
feistyduck.com
·
2d
·
Lobsters
·
…
Peer-to-peer sync for a reading app with mTLS,
CRDTs
, and
HLCs
🔌
Offline-first Apps
tech.stonecharioteer.com
·
6d
·
Hacker News
,
r/programming
·
…
The "Stop-the-World" Problem: How I
Rebuilt
My Database's Core to Kill 200ms Latency
Spikes
🗄️
Database Internals
veniatyrannus993225.substack.com
·
1d
·
Substack
·
…
IronFleet
:
proving
practical distributed systems correct
⚔️
Lean Tactics
youtube.com
·
5d
·
Lobsters
·
…
Ask HN: A
Decentralized
Proof-of-Aliveness
?
🤝
Distributed Consensus
news.ycombinator.com
·
3d
·
Hacker News
·
…
Implementing Amazon
Dynamo
in
Elixir
🤝
Consensus Protocols
jitesh117.github.io
·
6d
·
Hacker News
·
…
Community as a
Distribution
Growth Engine
🎯
Content Recommendation
hackernoon.com
·
3d
·
…
Securing
Elliptic
Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and
Mitigations
🔐
Quantum Security
arxiv.org
·
1d
·
…
Tell HN: We built our own SAT
solver
for
SHA-256
🔐
Hash Functions
news.ycombinator.com
·
5d
·
Hacker News
·
…
Decentralized Proof-of-Location for Content
Provenance
: Towards Capture-Time
Authenticity
🔐
PKI Archaeology
arxiv.org
·
2d
·
…
predatorray/dandelion-mesh
: Serverless mesh network for browsers using WebRTC. Connect, broadcast, and sync state without a central server.
📞
WebRTC
github.com
·
5d
·
Hacker News
·
…
Distributed Quantum
Discrete
Logarithm
Algorithm
⚛️
Quantum Algorithms
arxiv.org
·
3d
·
…
Integration
Adapter
Architecture for Food
Traceability
Blockchain
🔌
Interface Evolution
arxiv.org
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help