🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Distributed Hash Tables

P2P Networks, Consistent Hashing, Decentralized Storage, DHT Routing

macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
sentinelone.comΒ·19h
🦠Malware Analysis
Wanting to create a NAS mainly for storing old media and hosting a Jellyfin server - Complete noob, any pointers?
reddit.comΒ·7hΒ·
Discuss: r/homelab
🏠Homelab Preservation
RFC 9309 – Robots Exclusion Protocol
datatracker.ietf.orgΒ·18hΒ·
Discuss: Hacker News
🌐DNS Security
Know Your Enemy: Understanding Dark Market Dynamics
darkreading.comΒ·1d
🌳Archive Merkle Trees
Understanding the NCSC’s New API Security Guidance
lab.wallarm.comΒ·18h
πŸ“¦Container Security
Distributionally Robust Joint Chance-Constrained Optimization for Electricity Imbalance: Integrating Renewables and Storage
arxiv.orgΒ·1d
🀝Consensus Algorithms
Netflix Tudum Architecture: from CQRS with Kafka to CQRS with RAW Hollow
netflixtechblog.comΒ·10hΒ·
Discuss: Hacker News
🌊Streaming Systems
🧱 How We’d Architect a Crypto Messenger With Peer-to-Peer Transfers
dev.toΒ·18hΒ·
Discuss: DEV
🀝Distributed Consensus
Yubi Whati? (YubiKeys, ECDSA, and X.509)
ram.tianon.xyzΒ·22h
πŸ”PKI Archaeology
Data-Star.dev – v1 and Beyond
data-star.devΒ·14hΒ·
Discuss: Hacker News
🏺ZIP Archaeology
Resource-Efficient Modular Automation Core Library in Go (First Project!)
reddit.comΒ·12hΒ·
Discuss: r/golang
🌐Protocol Synthesis
The Right Approach to Authorization in RAG
osohq.comΒ·1dΒ·
Discuss: Hacker News
🧬PostgreSQL Forensics
Secure Cooperative Gradient Coding: Optimality, Reliability, and Global Privacy
arxiv.orgΒ·1h
🀐Secure Multiparty
We stopped relying on bloom filters and now sort our ClickHouse primary key on a resource fingerprint. It cut our log query scans to 0.85% of blocks.
signoz.ioΒ·16hΒ·
Discuss: r/programming
πŸ—„οΈDatabase Internals
Using Protobuf to make Jira Cloud faster
atlassian.comΒ·1dΒ·
Discuss: Hacker News
🌊Streaming Systems
​​RAG is dead: why enterprises are shifting to agent-based AI architectures
techradar.comΒ·1d
πŸ’ΎPersistence Strategies
The Engineering Behind Fast Analytics: Columnar Storage Explained
outofdesk.netlify.appΒ·2dΒ·
Discuss: Hacker News
πŸ—ƒοΈDatabase Storage
Computer Scientists Figure Out How To Prove Lies
quantamagazine.orgΒ·1dΒ·
Discuss: Lobsters, Hacker News, Hacker News, Hacker News
πŸ”—Hash Chains
File Storage vs Object Storage vs Block Storage
blog.algomaster.ioΒ·2d
πŸ—„οΈFile Systems
Regolith - A JavaScript library immune to ReDoS attacks
github.comΒ·1h
⚑Dependent Rust
Loading...Loading more...
AboutBlogChangelogRoadmap