๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ณ๏ธ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Can You Crack the Roman Code?
thefiddler.substack.comยท1dยท
Discuss: Substack
๐Ÿ”Cryptographic Archaeology
Flickr Foundation goes Dutch!
flickr.orgยท2d
๐Ÿ›Digital humanities
Skype Is Gone: The FOSS Alternative
boilingsteam.comยท12h
๐Ÿ”ŒInterface Evolution
Joint Force - 2025 Ebitengine game jam entry
rocketnine.itch.ioยท3hยท
Discuss: r/Android, r/golang, r/linux, r/opensource
๐ŸŽฏProof Tactics
OAuth consent phishing explained and prevented
techcommunity.microsoft.comยท2dยท
Discuss: Hacker News
๐Ÿ”“LDAP Injection
Cilium Egress Gateway API: Implementing as an in-built Security through Kernel
blog.devops.devยท8h
๐Ÿ“ฆContainer Security
Zo.computer: A personal computer in the cloud operated (mostly) conversationally
robc.substack.comยท6hยท
Discuss: Substack
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
I will fix your vibe-coded MVP โ€“ sgnt.ai
sgnt.aiยท18hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Using Generative AI to Strengthen & Accelerate Learning โ€ข Barbara Oakley โ€ข GOTO 2024
youtube.comยท1d
๐Ÿ”ฒCellular Automata
What is smishing?
proton.meยท2d
๐Ÿ”Hash Functions
Introduction F-LEXUS.COM to Deep Learning
dev.toยท9hยท
Discuss: DEV
๐Ÿง Machine Learning
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.orgยท4d
๐Ÿ’ปLocal LLMs
AI Powered Honeypot
dev.toยท3dยท
Discuss: DEV
๐Ÿฆ Malware Analysis
RTK โ€“ query your Rust codebase and make bindings anywhere
github.comยท1dยท
Discuss: Hacker News, Hacker News
๐Ÿฆ€Rust Macros
This new malware has developed a spooky way to tell AI-based detection methods to ignore it
techradar.comยท1d
๐Ÿฆ Malware Analysis
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.orgยท2d
๐Ÿ“„Document Digitization
The Building Blocks - Understanding MCP, Agents, and LLMs (Part 2/5)
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Constraint Handling
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท4d
๐Ÿ”ขBitwise Algorithms
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.orgยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Vulnerability Debt: How Do You Put a Price on What to Fix?
darkreading.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap