๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

X1 Achieves Record Growth as Numerous Fortune 500 Companies Standardize on X1 Enterprise
blog.x1discovery.comยท1d
๐Ÿ”—Data Provenance
How Trumpโ€™s U-turn on chips could unleash Chinese AI
economist.comยท2d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
tclahr/uac
github.comยท2d
๐Ÿ“„Document Digitization
The Comprehensive Guide to Knowledge Graphs
agilelab.itยท10hยท
Discuss: Hacker News
๐Ÿ“ŠGraph Databases
Allianz Life hit by hackers, customer and staff personal data stolen
grahamcluley.comยท4d
๐Ÿ›กCybersecurity
Foreign spies are targeting defence employees working on Aukus, Asio boss reveals
theguardian.comยท1d
๐Ÿ”ŽOSINT Techniques
Turning VS Code into a Product Framework: Progrium.xyz
progrium.xyzยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Hiding in Plain Sight: Gemini AI CLI Hijack | Tracebit
tracebit.comยท4d
๐Ÿ›ก๏ธCLI Security
Ghislaine Maxwell quietly moved from Florida to Texas prison as lawyers seek Trump pardon: report
the-independent.comยท2h
๐Ÿ›กCybersecurity
MetaCPAN's Traffic Crisis: An Eventual Success Story
perl.comยท3dยท
Discuss: Hacker News
๐ŸŒIPFS
How invisibility cloaks could make us disappear โ€“ at least from AI
newscientist.comยท1d
๐Ÿง…Tor Networks
Ask HN: What's your (opinionated) way to iterate FAST in production
news.ycombinator.comยท2hยท
Discuss: Hacker News
๐Ÿ”„Reproducible Builds
The Next Frontier of Autonomous Navigation for UAVs: A Hybrid Approach to GPS-Denied Environments
hackernoon.comยท12h
๐Ÿ“Projective Geometry
The two people shaping the future of OpenAIโ€™s research
technologyreview.comยท1dยท
Discuss: Hacker News, r/technews
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Day 52: When Your Dead Phone Becomes Your Best Study Buddy
dev.toยท6hยท
Discuss: DEV
๐ŸŒณIncremental Parsing
Achieving actually full disk encryption of UEFI ESP at rest with TCG OPAL, FIPS, LUKS
blog.surgut.co.ukยท4dยท
Discuss: blog.surgut.co.uk
๐Ÿ”’Secure Boot
From News Source Sharers to Post Viewers: How Topic Diversity and Conspiracy Theories Shape Engagement With Misinformation During a Health Crisis
arxiv.orgยท1d
๐Ÿ“ฐContent Curation
AI is Eating QA's Lunch (And I'm Here for It!)
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Concolic Testing
Dropbox Passwords will soon be no more - here's how to save your passwords, and our pick of alternatives
techradar.comยท2d
๐Ÿ”Archive Encryption
Concrete Security Bounds for Simulation-Based Proofs of Multi-Party Computation Protocols
arxiv.orgยท1d
๐ŸŽฏPerformance Proofs
Loading...Loading more...
AboutBlogChangelogRoadmap