๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Distributed Hash Tables

P2P Networks, Consistent Hashing, Decentralized Storage, DHT Routing

Under lock and key: Safeguarding business data with encryption
welivesecurity.comยท1d
๐Ÿ”Archive Encryption
Spilling the Beans on Multiplatform Cryptominer Soco404
circleid.comยท2d
๐Ÿ“กDNS Archaeology
Your Biggest Customer Might Be Your Biggest Bottleneck
densumesh.devยท3dยท
Discuss: Lobsters, Hacker News
๐ŸŒŠStream Processing
The Great Bitnami BSI Shift: What the New Costs and Licenses Mean for End Users
iits-consulting.deยท2dยท
Discuss: Hacker News
๐ŸบZIP Archaeology
A Practical Approach for Post-Quantum Migration With Hybrid Clouds
darkreading.comยท2d
๐Ÿ”Quantum Security
Civics Is Boring. So, Let's Encrypt Something
queue.acm.orgยท4dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
Gromov-Wasserstein and optimal transport: from assignment problems to probabilistic numeric
arxiv.orgยท1d
๐Ÿ“Compression Bounds
How Has IoT Security Changed Over the Past 5 Years?
darkreading.comยท1d
๐Ÿ Home Automation
Vortex: An extensible, state of the art columnar file format
github.comยท2dยท
Discuss: Hacker News
๐Ÿ”—Archive Combinators
ICYMI: If you aren't running complex public-facing production services, you probably don't need a network diagram.
i.redd.itยท16hยท
Discuss: r/homelab
๐Ÿ HomeLab
Warming Up for Zeroth-Order Federated Pre-Training with Low Resource Clients
arxiv.orgยท2d
๐Ÿ“ŠQuantization
FlashAttention by hand
dev.toยท7hยท
Discuss: DEV
โšกSIMD Vectorization
\textit{In Silico} Benchmarking of Detectable Byzantine Agreement in Noisy Quantum Networks
arxiv.orgยท2d
โš›๏ธQuantum LDPC
Predictive Habit Formation via Dynamic Bayesian Network Optimization
dev.toยท23hยท
Discuss: DEV
๐Ÿง Machine Learning
Go from Zero to a Full-Stack, Type-Safe, Cross-Platform App in Seconds
dev.toยท21hยท
Discuss: DEV
๐Ÿ”„Language Evolution
IdentityMesh: Exploiting Lateral Movement in Agentic Systems
lasso.securityยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
MTQA:Matrix of Thought for Enhanced Reasoning in Complex Question Answering
arxiv.orgยท1d
๐Ÿ”Information Retrieval
Secure and Accurate Enterprise AI: How MindsDB Delivers Security-First Data Intelligence
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Capability Systems
VulnHub CTF - Moria 1.1
infosecwriteups.comยท1d
๐Ÿ”“Password Cracking
AI-Driven Dynamic Delivery Route Optimization via Multi-Modal Graph Neural Networks
dev.toยท18hยท
Discuss: DEV
๐ŸŒ€Riemannian Computing
Loading...Loading more...
AboutBlogChangelogRoadmap