🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Internet Archive Europe Joins LIBER 2025 Panel on “Four Rights for Libraries”
internetarchive.eu·3h
⚖️Archive Ethics
Can You Crack the Roman Code?
thefiddler.substack.com·1d·
Discuss: Substack
🔐Cryptographic Archaeology
Flickr Foundation goes Dutch!
flickr.org·2d
🏛Digital humanities
Skype Is Gone: The FOSS Alternative
boilingsteam.com·7h
🔌Interface Evolution
Cilium Egress Gateway API: Implementing as an in-built Security through Kernel
blog.devops.dev·3h
📦Container Security
Zo.computer: A personal computer in the cloud operated (mostly) conversationally
robc.substack.com·1h·
Discuss: Substack
🖥️Self-hosted Infrastructure
I will fix your vibe-coded MVP – sgnt.ai
sgnt.ai·13h·
Discuss: Hacker News
🔓Hacking
Using Generative AI to Strengthen & Accelerate Learning • Barbara Oakley • GOTO 2024
youtube.com·1d
🔲Cellular Automata
What is smishing?
proton.me·2d
🔐Hash Functions
Introduction F-LEXUS.COM to Deep Learning
dev.to·4h·
Discuss: DEV
🧠Machine Learning
Becoming a 10x Engineer in the Era of AI Agents
dev.to·12h·
Discuss: DEV
🏠Homelab Orchestration
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.org·4d
💻Local LLMs
This new malware has developed a spooky way to tell AI-based detection methods to ignore it
techradar.com·1d
🦠Malware Analysis
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.org·3d·
Discuss: Hacker News
🔓Hacking
RTK – query your Rust codebase and make bindings anywhere
github.com·1d·
Discuss: Hacker News, Hacker News
🦀Rust Macros
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·2d
📄Document Digitization
The Building Blocks - Understanding MCP, Agents, and LLMs (Part 2/5)
dev.to·1d·
Discuss: DEV
🔗Constraint Handling
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·4d
🔢Bitwise Algorithms
Vulnerability Debt: How Do You Put a Price on What to Fix?
darkreading.com·1d
🔓Hacking
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
darkreading.com·1d
🛡️eBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap