🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Assessing Your Organization’s Digital Asset Management Needs
weareavp.com·16h
🔗Data Provenance
Dependent types I › Universes, or types of types
jonmsterling.com·1d·
Discuss: Hacker News
🔤Type Theory
My Own WTF, or How to Not Handle URL Redirects
deanebarker.net·14h·
Discuss: Hacker News
🌐DNS Security
strongly typed?
dotat.at·5h·
Discuss: Hacker News
🔗Dependently Typed
Qwiet AI Extends Microsoft Support in Platform for Fixing Vulnerabilities
devops.com·20h
🧪Protocol Fuzzing
How Does a Firewall Work Step by Step
kalilinuxtutorials.com·3d·
Discuss: Hacker News
🌐Network Security
Implementing Forth in Go and C
eli.thegreenplace.net·1d·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
🔗Concatenative Programming
Next-gen voice, video, and chat messaging using your domain name not your number
thunderbolt.com·4d·
Discuss: Hacker News
🔌Operating system internals
Delta Lake: Transform Pandas Prototypes into Production
codecut.ai·1d·
Discuss: Hacker News
📐Delta Encoding
Research, Review, Rebuild: Intelligent Modernisation with MCP and Strategic Prompting
martinfowler.com·16h
🦋Format Metamorphosis
Hook Version 3: The Banking Trojan with The Most Advanced Capabilities
zimperium.com·2d
🛡️ARM TrustZone
DOGE employees uploaded Social Security database to ‘vulnerable’ cloud, agency whistleblower says
fedscoop.com·1d
🔗Data Provenance
Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks
techradar.com·20h
🎫Kerberos Attacks
AI-Powered Detection of Inappropriate Language in Medical School Curricula
arxiv.org·2h
🎵Audio ML
Microsoft can't guarantee data sovereignty – OVHcloud says 'We told you so'
theregister.com·15h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
An epiphany about bloated web pages might be the result of a dumb network (2023)
boston.conman.org·1d·
Discuss: Hacker News
🚀Indie Hacking
SkyTrust: Blockchain-Enhanced UAV Security for NTNs with Dynamic Trust and Energy-Aware Consensus
arxiv.org·1d
🤝Consensus Algorithms
Bridging Backend Engineering with AI: The Rise of the Intelligent Platform Engineer
hackernoon.com·12h
🔌Interface Evolution
Skeptik: A Hybrid Framework for Combating Potential Misinformation in Journalism
arxiv.org·1d
📰Content Curation
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed
guptadeepak.com·1d·
Discuss: DEV, Hacker News
🔐Capability Systems
Loading...Loading more...
AboutBlogChangelogRoadmap