🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Distributed Hash

Chord Protocol, P2P Networks, Consistent Hashing, DHT Routing

Why β€˜TRUST-NO-ONE’ Is Your Strongest Defense
infosecwriteups.comΒ·9h
🌐Network Security
Comprehensive Comparison of Algorithmic Trading Platforms
jonathankinlay.comΒ·9hΒ·
Discuss: Hacker News
πŸ”BitFunnel
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing Oracle for DeFi
arxiv.orgΒ·14h
πŸ”—Hash Chains
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·21hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comΒ·1d
πŸ›‘οΈeBPF Security
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comΒ·1d
🎫Kerberos Exploitation
Networking for Systems Administrators
mwl.ioΒ·5hΒ·
Discuss: Hacker News
🌐DNS over QUIC
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·1d
πŸ”“Password Cracking
HashMap in Java
dev.toΒ·2dΒ·
Discuss: DEV
🌳Trie Structures
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.orgΒ·3h
🎯Threat Hunting
Maintaining a Bounded Degree Expander in Dynamic Peer-to-Peer Networks
arxiv.orgΒ·1d
🀝Consensus Algorithms
Show HN: Cartesian vs. Sparse Merkle Trees – faster treap-based design in Go
rafaelescrich.medium.comΒ·5dΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
8 Essential Python Patterns for Building Bulletproof APIs That Scale
dev.toΒ·1dΒ·
Discuss: DEV
πŸŒ€Brotli Internals
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·16hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
Why DAO Contribution Sucks (and How to Fix It)
finn.mirror.xyzΒ·1dΒ·
Discuss: Hacker News
🀝Distributed Consensus
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·21hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
SSL and TLS Deployment Best Practices
github.comΒ·19hΒ·
Discuss: Hacker News
πŸ”Certificate Analysis
New: Improve Apache Iceberg query performance in Amazon S3 with sort and z-order compaction
aws.amazon.comΒ·21h
πŸ”„Burrows-Wheeler
Why use hash puzzles for proof-of-work?
johndcook.comΒ·3dΒ·
Discuss: Hacker News
πŸ”—Hash Chains
Loading...Loading more...
AboutBlogChangelogRoadmap