Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Distributed Hash
Chord Protocol, P2P Networks, Consistent Hashing, DHT Routing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19498
posts in
398.0
ms
**Title**
dev.to
·
2h
·
Discuss:
DEV
👁️
Perceptual Hashing
Stop using 192.168.1.0/24: A
Contrarian
Guide to Home Network
Addressing
routerjockey.com
·
2d
🌐
DNS Security
IPFS
&
Decentralized
Storage: Why “I’ll Just Put It On
IPFS
” Isn’t Enough
future.forem.com
·
22h
·
Discuss:
DEV
🌐
IPFS
Staying
secure and simple in a
complex
world
tailscale.com
·
3d
🔐
Capability Systems
Why
Web3
is the
walking
dead – it doesn't die but it is not alive
theriseofai.substack.com
·
18h
·
Discuss:
Substack
🤝
Distributed Consensus
From
ALB
to Caddy - Our
Wandering
Path to Supporting Thousands of Domain Names
fusionauth.io
·
1d
·
Discuss:
Hacker News
🏠
Homelab Federation
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csa) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
·
1d
·
Discuss:
Hacker News
🛡️
ARM TrustZone
Everything in
Git
: Running a Trading Signal Platform on
NixOS
pxdynamics.com
·
1d
·
Discuss:
Hacker News
❄️
Nix Adoption
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
1d
🔐
Quantum Security
Updates and Plans V: From
Boise
to Tel Aviv, Ceasefire, My 70th Birthday, Nostalgia, Problems, Outrageous
Conjectures
, Quantum, and AI
gilkalai.wordpress.com
·
3d
🕸️
Graph Algorithms
Welcome to
Meltnet
: A Blueprint for Digital Sovereignty in a
Fragmented
World
circleid.com
·
3d
🏠
Homelab Federation
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
1d
🎫
Kerberos Exploitation
stdlib
v7.2
erlang.org
·
19h
·
Discuss:
Hacker News
🦀
Rusty Databases
Postgres
performance at any scale
pganalyze.com
·
1d
🧬
PostgreSQL Forensics
Private Data Space Model
privatedata.space
·
2d
✅
Format Verification
LTRAS
: A
Linkable
Threshold Ring Adaptor Signature Scheme for Efficient and Private Cross-Chain Transactions
arxiv.org
·
1d
🔗
Hash Chains
Detecting
Phishing
Patterns at Scale: A Go-based Approach for Enterprise Security
dev.to
·
3d
·
Discuss:
DEV
🎯
Threat Hunting
Facing the Quantum Threat:
Cisco
’s Strategic Approach to
PQC
blogs.cisco.com
·
1d
🔐
Quantum Security
On the Promises of '
High-Assurance
'
Cryptography
symbolic.software
·
2d
·
Discuss:
Lobsters
,
Hacker News
🌳
Archive Merkle Trees
Atomic
Information Flow: A Network Flow Model for Tool
Attributions
in RAG Systems
arxiv.org
·
1d
🔗
Topological Sorting
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help