๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ณ๏ธ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Looks Good, Reads Bad: Imaging 5โ€“25-inch floppy disks on mismatched drives
digitalpreservation-blog.lib.cam.ac.ukยท1d
๐Ÿ› ๏ธGreaseweazle
This daringly experimental thriller is a puzzle-lover's delight
newscientist.comยท2d
๐Ÿ”“Hacking
An OCC Idea
lambdacreate.comยท3d
๐Ÿ—„๏ธDatabase Internals
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgยท4d
๐Ÿ’ฃZIP Vulnerabilities
Family says hidden spy cams at Airbnb captured footage of them having sex, kids using bathroom: lawsuit
the-independent.comยท19h
๐Ÿ”“Hacking
First NetHack ascension, and insights into the AI capabilities it requires
mikaelhenaff.substack.comยท2dยท
Discuss: Substack
๐Ÿ”ฒCellular Automata
Show HN: m(ctf)p โ€“ A semi-automated environment for solving CTF challenges
git.sr.htยท14hยท
Discuss: Hacker News
โšกProof Automation
How Foreign Scammers Use U.S. Banks to Fleece Americans
propublica.orgยท3dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Backpropagation's Biological Incarnation Is Consciousness Itself
dmf-archive.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Architecting J.A.R.V.I.S. With the Gemini API and Concurrency in Rust
rohan.gaยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Defining Zero Trust for Bring Your Own Cloud (BYOC)
signoz.ioยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Do you use ChatGPT at work? Try one of these 11 prompts to power up your productivity with AI
techradar.comยท1h
๐Ÿง Personal Knowledge Base
US, French authorities confirm arrest of BreachForums hackers
techcrunch.comยท1d
๐Ÿ”“Hacking
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.orgยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
RTK โ€“ query your Rust codebase and make bindings anywhere
github.comยท22hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.orgยท2d
๐Ÿ“„Document Digitization
The Building Blocks - Understanding MCP, Agents, and LLMs (Part 2/5)
dev.toยท19hยท
Discuss: DEV
๐Ÿ”—Constraint Handling
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท4d
๐Ÿ”ขBitwise Algorithms
Vulnerability Debt: How Do You Put a Price on What to Fix?
darkreading.comยท1d
๐Ÿ”“Hacking
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
darkreading.comยท1d
๐Ÿ›ก๏ธeBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap