🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“Ÿ Historical Protocols

UUCP, X.25, Token Ring, Communication Heritage, Network Evolution

Thinking in Hoses and Wires, Not Bolted Gears (Protocol-Driven Development)
github.comΒ·6hΒ·
Discuss: Hacker News
🌐Protocol Synthesis
The replacement internet is already here
aardvark.co.nzΒ·5h
πŸ•ΈοΈMesh Networks
Part 7: Interacting with ERC-721 NFTs using `web3.py`
dev.toΒ·1hΒ·
Discuss: DEV
πŸ“ABNF Extensions
Why you should rethink legacy and consider Event-Driven Architecture
blog.scottlogic.comΒ·10h
πŸ”ŒInterface Evolution
DNS at IETF 123
potaroo.netΒ·21h
🌐DNS Security
What Tailscale isn't: an anonymity service
tailscale.comΒ·4h
πŸ”—Tailscale
Looking back at Martin Gardner’s RSA article
johndcook.comΒ·1d
πŸ”²Lattice Cryptography
Embracing the Model Context Protocol in practice: An engineering deep-dive
xpander.aiΒ·23hΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
Real-World Evaluation of Protocol-Compliant Denial-of-Service Attacks on C-V2X-based Forward Collision Warning Systems
arxiv.orgΒ·16h
🌸Bloom Variants
How to run Uptime Kuma in Docker in an IPv6-only environment
ounapuu.eeΒ·1d
πŸ“¦Container Security
Privacy, Code, and the Future
news.ycombinator.comΒ·1hΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
A Likely Zero-Day Vulnerability in SonicWall SSL-VPN Exploited by Akira Ransomware Group
research.kudelskisecurity.comΒ·11h
🎫Kerberos Exploitation
Fail-Open: Reckless or Resilient?
nextorbit.coΒ·17hΒ·
Discuss: Hacker News
πŸ›‘οΈError Boundaries
Serving Indigenous communities with high-speed Internet through monsoons and desert
blog.apnic.netΒ·22h
πŸ•ΈοΈMesh Networking
Reducing double spend latency from 40 ms to < 1 ms on privacy proxy
blog.cloudflare.comΒ·1dΒ·
Discuss: Hacker News
🌐DNS over QUIC
The Future of Work: Relationship Rebuilding and Network Connections
growthzone.comΒ·2hΒ·
Discuss: Hacker News
⏳Time Capsule Networks
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beΒ·2d
βš—οΈAlgebraic Coding
Propagating Bonjour/Rendezvous to Normal DNS
taoofmac.comΒ·8h
🌐DNS Security
A New Concurrent ML in Guile Scheme
wingolog.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”„Lens Laws
warp v0.4
seanmonstar.comΒ·9h
πŸ”ŒInterface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap