🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

The Reasons I'll Never Switch from Obsidian to Tana
dsebastien.net·1d
🔌Archive APIs
Stacked Clock (2014)
danieldjohnson.com·2d·
Discuss: Hacker News
🎞️Tape Combinatorics
A new, state-sponsored macOS malware: NimDoor
lowendmac.com·2d
🦠Malware Analysis
The New Troll Diet
diegoe.be·3d·
Discuss: Hacker News
🎯Threat Hunting
Advice on how to get a job at Canonical
canonical.com·1d·
Discuss: Lobsters
🗺️Competency Maps
Drug Discovery may be in the Cold War Era
kyunghyuncho.me·3d·
Discuss: Hacker News
⚛️Information Physics
Show HN: OneClick local runtime proxy with expressive guardrails for MCP servers
tramlines.io·3d·
Discuss: Hacker News
🛡️eBPF Security
Amal Clooney has a strict rule for house guests that helps protect her kids' privacy
businessinsider.com·1d
🏠Personal Archives
ClassDistribution is really neat
bernsteinbear.com·3d·
Discuss: Hacker News
📏Code Metrics
A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now
wired.com·2d
🔓Hacking
The Mythical 10x Developer? More like 0.8x: Why We're Moving Away From LLMs
gametorch.app·1d·
Discuss: r/programming
🔄Language Evolution
Intelligent observability is THE critical tool for hybrid IT management
techradar.com·3d
👁️System Observability
Plug. Play. Persist. Inside a Ready-to-Go Havoc C2 Infrastructure
arxiv.org·3d
🌐WASI
Rare blue proteins from cold-adapted microbes could serve as prototypes for molecular on-off switches
phys.org·15h
⚛️Quantum Archives
Thinking Beyond Tokens: From Brain-Inspired Intelligence to Cognitive Foundations for Artificial General Intelligence and its Societal Impact
arxiv.org·3d
🔲Cellular Automata
Get user secrets for projects
dev.to·5d·
Discuss: DEV
📜Proof Carrying Code
Vibe Coding - Conversational Software Development - Part 1 Introduction
dev.to·19h·
Discuss: DEV
🎙️Whisper
VAPT Report on Credential Security in Windows 10 based Healthcare Infrastructure
infosecwriteups.com·3d
🎯NTLM Attacks
IdeaLab confirms data stolen in ransomware attack last year
bleepingcomputer.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Announce: Next-Gen Full Stack Framework For Go
dev.to·16h·
Discuss: DEV
⚔️Lean Tactics
Loading...Loading more...
AboutBlogChangelogRoadmap