Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Distributed Hash
Chord Protocol, P2P Networks, Consistent Hashing, DHT Routing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17986
posts in
175.6
ms
A simple load
balancer
from scratch written in
Golang
dev.to
·
1d
·
Discuss:
DEV
⚡
gRPC
A
Proof
of P =
NP
dev.to
·
14h
·
Discuss:
DEV
🎯
Performance Proofs
From
ALB
to Caddy - Our
Wandering
Path to Supporting Thousands of Domain Names
fusionauth.io
·
4d
·
Discuss:
Hacker News
🏠
Homelab Federation
Atomic
Information Flow: A Network Flow Model for Tool
Attributions
in RAG Systems
arxiv.org
·
3d
🔗
Topological Sorting
Welcome to
Meltnet
: A Blueprint for Digital Sovereignty in a
Fragmented
World
circleid.com
·
5d
🏠
Homelab Federation
Facing the Quantum Threat:
Cisco
’s Strategic Approach to
PQC
blogs.cisco.com
·
4d
🔐
Quantum Security
Internet
Coordination
in Times of War
labs.ripe.net
·
5d
📡
Network Protocol Design
Affordable
Blockchain
Development Services: Building Real
Blockchain
Solutions Without
Overspending
vibe.forem.com
·
5d
·
Discuss:
DEV
🤝
Distributed Consensus
Redis/Valkey
Replication
Internals
: The Architecture Behind Zero-Copy Command Propagation
frostzt.com
·
4d
·
Discuss:
Hacker News
,
r/programming
⚡
Redis Internals
OpenSSL
3 performance issues causing a
scalability
and security dilemma for organizations
techradar.com
·
4d
🖥️
Modern Terminals
Offline-First
Database with Cloud
Sync
, Collaboration & Real-Time Updates
dexie.org
·
3d
🔌
Offline-first Apps
Examining
black-box forensic tools in digital vehicle
forensics
: Capabilities, limitations, and practical implications
sciencedirect.com
·
6d
🔬
Hardware Forensics
Private Data Space Model
privatedata.space
·
4d
✅
Format Verification
22.00.0182
JDex
deep-dive
: data and storage options
johnnydecimal.com
·
6d
🗄️
Database Internals
On the
Feasibility
of Hybrid
Homomorphic
Encryption for Intelligent Transportation Systems
arxiv.org
·
5d
🔐
Homomorphic Encryption
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
📦
Container Security
The
Agentic
Trust Framework: Zero Trust
Governance
for AI Agents
cloudsecurityalliance.org
·
4d
·
Discuss:
Hacker News
🔲
Cellular Automata
What Is a
Brute
Force Attack and How to
Prevent
It
securityscorecard.com
·
5d
🔓
Password Cracking
MoaV
: Multi-Protocol Internet Censorship
Circumvention
Stack
moav.sh
·
6d
·
Discuss:
Hacker News
📞
WebRTC
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
3d
🔐
Quantum Security
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help