๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”— Hash Chains

Merkle Trees, Blockchain Fundamentals, Integrity Verification, Tamper Detection

Know Your Playground: The Essential Guide to Algorand for MEV Enthusiasts
hackernoon.comยท10h
๐ŸคDistributed Consensus
A distributed systems reliability glossary
antithesis.comยท10hยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท2hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.comยท9h
๐ŸคConsensus Algorithms
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท2d
๐ŸŒDNS Security
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท1d
๐Ÿ”Cryptographic Archaeology
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท8h
๐ŸบZIP Archaeology
New research connects quantum computing power to the security of cryptographic systems
phys.orgยท14h
๐Ÿ”Quantum Security
Show HN: A Scarce Cryptoasset Rooted in Private ETH Destruction
worm.cxยท2dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Computer Architecture: A quantitative approach
ikerexxe.github.ioยท1d
๐Ÿ–ฅ๏ธHardware Architecture
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceยท5h
๐Ÿ”ขBitwise Algorithms
Itโ€™s Not What You Pay, Itโ€™s How Fast You Play: A History of MEV
hackernoon.comยท10h
๐Ÿ–ฅ๏ธTerminal Renaissance
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.comยท1d
๐ŸคDistributed Consensus
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.ilยท4hยท
Discuss: Hacker News
๐ŸŽฏInteractive Provers
SSH-Passkeys: Leveraging Web Authentication for Passwordless SSH
arxiv.orgยท22h
๐Ÿ”PKI Archaeology
Building High-Performance GraphQL Servers in Golang with Optimized Resolver Patterns
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Week 28 โ€“ 2025
thisweekin4n6.comยท2d
๐ŸบKerberos Archaeology
KV260 BIST Tutorial - Recreating with VIVADO/Vitis 2025.1
hackster.ioยท1d
๐ŸŽฌVideo Codecs
On the Move: Fast Flux in the Modern Threat Landscape
bitsight.comยท13h
๐Ÿ“กBGP Archaeology
AsyncRAT Spawns Concerning Labyrinth of Forks
darkreading.comยท6h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap