🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Establishing a Centralized and Automated System for Classification Review
transforming-classification.blogs.archives.gov·5d
📄Document Digitization
More adventures in the land of AI and Open Source
blogs.gnome.org·16h
🦀Rust Macros
Anatomy of a Storage Drive: Hard Disk Drives
techspot.com·2d
🧲Magnetic Recording
Unicode variation selectors for invisible LLM injection
code.lol·1d·
Discuss: Hacker News
🧪Binary Fuzzing
Compiling a Functional Language to LLVM
danieljharvey.github.io·1d·
Discuss: Lobsters, Hacker News
🔗Lisp
CCTV captures Israeli attack on Hamas leaders in Doha
bbc.com·14h
⏱️SMPTE Timecode
Australia to force porn websites to check users’ ages under new internet rules
crikey.com.au·10h·
Discuss: Hacker News
🛡️Security Headers
Splitting a long string in lines efficiently
lemire.me·2d·
Discuss: Hacker News
⚡SIMD Optimization
US Tech Companies Enabled the Surveillance and Detention of Hundreds of Thousands in China
news.slashdot.org·16h
🇨🇳Chinese Computing
Scammers Are Exploiting Apple Calendar to Send Phishing Emails (Again)
lifehacker.com·1d
🎫Kerberos Attacks
Inside the Chaos at the C.D.C.
newyorker.com·20h
🛡Cybersecurity
How To Upgrade Your MCP Server With Context Engineering
thenewstack.io·1d
🦋Format Metamorphosis
Former Republican Senator Cory Gardner Becomes The Cable Industry’s Top Lobbyist
techdirt.com·1d
🧅Tor Networks
Causal Multi-fidelity Surrogate Forward and Inverse Models for ICF Implosions
arxiv.org·1d
⚙️Tape Engineering
Dev snared in crypto phishing net, 18 npm packages compromised
theregister.com·1d
💣ZIP Vulnerabilities
Behavioral Fingerprinting of Large Language Models
arxiv.org·2d
💻Local LLMs
Greener Deep Reinforcement Learning: Analysis of Energy and Carbon Efficiency Across Atari Benchmarks
arxiv.org·2d
🔲Cellular Automata
Chinese Hackers Game Google to Boost Gambling Sites
darkreading.com·5d
🎫Kerberos Exploitation
Stop Optimizing Code You Should Delete
dev.to·20h·
Discuss: DEV
🏗️Compiler Archaeology
We Hacked Burger King: How Auth Bypass Led to Drive-Thru Audio Surveillance
bobdahacker.com·3d·
Discuss: Hacker News
🏺Kerberos Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap