🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Hardware Attestation

TPM, Secure Boot, Archive Integrity, Hardware Security Modules

How to automatically decrypt a LUKS LVM setup on boot with a USB
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”HSM Integration
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.comΒ·2h
πŸ”Certificate Analysis
Linux Jargon Buster: What are Secure Boot & Shim Files?
itsfoss.comΒ·6h
πŸ”’Secure Boot
SSL and TLS Deployment Best Practices
github.comΒ·15hΒ·
Discuss: Hacker News
πŸ”Certificate Analysis
About to Take the Plunge - Any Final Words of Advice?
bargainhardware.co.ukΒ·59mΒ·
Discuss: r/homelab
πŸ”’Secure Boot
Watch the Geekom IT15 mini PC torture test: run over, hammered, and put in a washing machine
techspot.comΒ·4h
πŸ”ŒOperating system internals
Program Execution, follow-up
windowsir.blogspot.comΒ·2hΒ·
Discuss: www.blogger.com
⚑Performance Tools
Compulab MCM-iMX95 – A solder-down NXP i.MX 95 SoM
cnx-software.comΒ·10h
πŸ”ŒSingle Board PC
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comΒ·23h
πŸ›‘οΈeBPF Security
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·6h
πŸ”NTLM Forensics
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.comΒ·5h
🚨Incident Response
Secure User-friendly Blockchain Modular Wallet Design Using Android & OP-TEE
arxiv.orgΒ·1d
πŸ”—Hash Chains
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukΒ·1d
πŸ”“Password Cracking
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukΒ·13h
πŸ”Quantum Security
OpenELA Introduces Open-Source Verification Suite for Enterprise Linux
linuxiac.comΒ·4h
πŸ”“Open Source Software
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgΒ·13hΒ·
Discuss: Hacker News
πŸ”Homomorphic Encryption
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·2h
🦠Malware Analysis
How Not to Get Lost in PCI DSS Standards β€” A Tech Team’s Perspective
hackernoon.comΒ·8h
πŸ”—Data Provenance
This Blink Outdoor Security Camera System Is at Its Lowest Price Right Now
lifehacker.comΒ·1h
🎬Video Codecs
Loading...Loading more...
AboutBlogChangelogRoadmap