🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Hash Functions

Cryptographic Hashing, SHA Family, Collision Resistance, Digital Forensics

A haplotype-resolved pangenome of the barley wild relative <i>Hordeum bulbosum</i>
nature.com·2d
🧬Copy Number Variants
An inside look at Yubico’s transition to passwordless
yubico.com·1d
🎯NTLM Attacks
Online Extortion Is the New Ransomware: Why Hackers Just Want Your Data
lmgsecurity.com·1d
🔓Hacking
How Does PGP Encryption Work—and Is It Still Secure in 2025?
securityscorecard.com·3d
🔐Quantum Security
Show HN: Bedrock – An 8-bit computing system for running programs anywhere
benbridle.com·1d·
Discuss: Hacker News
📺VT100 Emulation
Generative AI: A Self-Study Roadmap
kdnuggets.com·21h
🗺️Competency Maps
Digital Fingerprints Tests Privacy Concerns in 2025
darkreading.com·21h
🔒Privacy Preserving
Feint and Attack: Attention-Based Strategies for Jailbreaking and Protecting LLMs
arxiv.org·3d
🎯Threat Hunting
An InfoSec Architect's First Taste of Temporal
supasaf.com·3d·
Discuss: Hacker News
⏰Temporal Logic
Functional Programming in 40 Minutes • Russ Olsen • GOTO 2024
youtube.com·2d
🧬Functional Programming
A.I. Can See You in Ways You Can't See Yourself
nytimes.com·17h·
Discuss: Hacker News
🤖AI Paleography
JECQ: Smart, Open-Source Compression for FAISS Users—6x Compression Ratio, 85% Accuracy
dev.to·2d·
Discuss: DEV
📊Quantization
Tracing LangChain with AWS X-Ray
dev.to·19h·
Discuss: DEV
👁️Observatory Systems
Degradation-Agnostic Statistical Facial Feature Transformation for Blind Face Restoration in Adverse Weather Conditions
arxiv.org·1d
📊Learned Metrics
Machine Learning Fundamentals: data augmentation example
dev.to·17h·
Discuss: DEV
🌊Stream Processing
I'm more proud of these 128 kilobytes than anything I've built since
medium.com·13h·
Discuss: Hacker News
📸PNG Optimization
ATC/OSDI'25 Technical Sessions
muratbuffalo.blogspot.com·1d·
Discuss: Hacker News
🔌Interface Evolution
Dearest C++, Let Me Count the Ways I Love/Hate Thee
hackaday.com·16h
🔩Systems Programming
Axiomatic characterizations of dissimilarity orderings and distances between sets
arxiv.org·3d
🔗Combinatory Logic
What is device intelligence? An explainer guide
fingerprint.com·2d
🏺Kerberos Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap