🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

A few more notes about Tom L
blog.computationalcomplexity.org·21h·
Discuss: blog.computationalcomplexity.org
🧪Cassette Hacks
Ruby gems still broken after 15 years
felipec.wordpress.com·5h
❄️Nixpkgs
7 Matplotlib Tricks to Better Visualize Your Machine Learning Models
machinelearningmastery.com·3d
📐Mathematical Art
We Should All Code Like Steve Jobs
priver.dev·3d·
Discuss: Hacker News
📏Code Metrics
Yellow stickers and fridge hacks: How to feed children for less in the holidays
bbc.com·23h
🧮Algorithmic Cooking
Should we remove XSLT from the web platform?
github.com·2d·
Discuss: Hacker News
🔀XSLT
As a trained barista, I want you to know these 3 things before buying your next coffee maker
techradar.com·7h
☕Coffee
From apps to matchmaking: the diverse ways American Muslims navigate finding marriage partners
the-independent.com·11h
🎯Recommendation Metrics
We're in the thick of a creatine craze but do you know what you're really taking?
abc.net.au·1d
🧮Theorem Proving
Show HN: Happy Coder – End-to-End Encrypted Mobile Client for Claude Code
github.com·3d·
Discuss: Hacker News
🚀Indie Hacking
Adam Optimizer in Deep Learning – A Beginner’s Guide
dev.to·1d·
Discuss: DEV
📊Quantization
Microservices: Is It Worth the Trouble?
hackernoon.com·2d
🌊Streaming Systems
Integrated Communication and Remote Sensing in LEO Satellite Systems: Protocol, Architecture and Prototype
arxiv.org·2d
ℹ️Information Theory
Tasklin, a Python CLI to run multiple AI models
dev.to·21h·
Discuss: DEV
🌀Brotli Internals
Autonomous Orbital Debris Mitigation via Reinforcement Learning and Predictive Spectral Analysis
dev.to·2d·
Discuss: DEV
🔲Cellular Automata
Automated Differential Privacy Enforcement via Adaptive Kernel Density Estimation (ADPE-KDE) in Streaming Sensor Data
dev.to·6d·
Discuss: DEV
🛡️Differential Privacy
Show HN: Enter your domain and my open-source agent will hack it
github.com·5d·
Discuss: Hacker News, r/SoftwareEngineering
🎫Kerberos Exploitation
Automated Validation Pipeline for High-Dimensional Scientific Data Analysis
dev.to·5d·
Discuss: DEV
🔍FLAC Forensics
Understanding Satoshi
hackernoon.com·4d
🌳Archive Merkle Trees
Don't Buy TQQQ After A Big Run Higher: Signs Of Market Top
seekingalpha.com·1d
🔍BitFunnel
Loading...Loading more...
AboutBlogChangelogRoadmap