๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Hardware Attestation

TPM, Secure Boot, Archive Integrity, Hardware Security Modules

How to automatically decrypt a LUKS LVM setup on boot with a USB
dev.toยท7hยท
Discuss: DEV
๐Ÿ”HSM Integration
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.comยท5h
๐Ÿ”Certificate Analysis
Linux Jargon Buster: What are Secure Boot & Shim Files?
itsfoss.comยท9h
๐Ÿ”’Secure Boot
82 x 50mm SoM combines NXP i.MX 8M Mini SoC with 25 TOPS DEEPX DX-M1 AI accelerator
cnx-software.comยท42m
๐Ÿ–ฅ๏ธHardware Architecture
SSL and TLS Deployment Best Practices
github.comยท18hยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
About to Take the Plunge - Any Final Words of Advice?
bargainhardware.co.ukยท4hยท
Discuss: r/homelab
๐Ÿ”’Secure Boot
Watch the Geekom IT15 mini PC torture test: run over, hammered, and put in a washing machine
techspot.comยท7h
๐Ÿ”ŒOperating system internals
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
securityscorecard.comยท2h
๐ŸŒณArchive Merkle Trees
Program Execution, follow-up
windowsir.blogspot.comยท5hยท
Discuss: www.blogger.com
โšกPerformance Tools
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comยท1d
๐Ÿ›ก๏ธeBPF Security
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comยท9h
๐Ÿ”NTLM Forensics
Your Forensics, Your Way: Flexible Deployment For Real-Time Results
forensicfocus.comยท9h
๐ŸšจIncident Response
Secure User-friendly Blockchain Modular Wallet Design Using Android & OP-TEE
arxiv.orgยท1d
๐Ÿ”—Hash Chains
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.ukยท1d
๐Ÿ”“Password Cracking
Encrypting identifiers in practice
sjoerdlangkemper.nlยท12h
๐ŸŒŠStream Ciphers
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukยท16h
๐Ÿ”Quantum Security
OpenELA Introduces Open-Source Verification Suite for Enterprise Linux
linuxiac.comยท7h
๐Ÿ”“Open Source Software
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.orgยท16hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท5h
๐Ÿฆ Malware Analysis
Before Windows 10 goes EOL, I'm testing three alternative Linux distros to save my 6-year-old laptop from the landfill
tomshardware.comยท1h
๐Ÿ”ŒOperating system internals
Loading...Loading more...
AboutBlogChangelogRoadmap