🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.com·3h
🔐Capability Systems
Hackaday Links: August 24, 2025
hackaday.com·1d
📼Cassette Hacking
⌥ The U.S.’ Increasing State Involvement in the Tech Industry
pxlnv.com·6h
🛡Cybersecurity
Investigators Used Terrible Computer Fraud Laws To Ensure People Were Punished For Leaking Air Crash Footage To CNN
techdirt.com·3d·
Discuss: Hacker News
🔍Tape Forensics
Once Upon a Pipe in the West: A Working Adapter from HDMI to Gardena – Jhauser
jhauser.de·1d·
Discuss: Lobsters, Hacker News
🧪Cassette Hacks
The Cartel Supercomputer of 1994
vice.com·13h·
Discuss: Hacker News
📼Cassette Hacking
Rao Differential Privacy
arxiv.org·5h
🛡️Differential Privacy
Hacker and Physicist – A Tale of "Common Sense"
supasaf.com·3d·
Discuss: Hacker News
🔐Cryptographic Archaeology
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·13h·
Discuss: Hacker News
✅Format Validation
Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization
arxiv.org·5h
🖼️JPEG Forensics
L-XAIDS: A LIME-based eXplainable AI framework for Intrusion Detection Systems
arxiv.org·5h
🔍Vector Forensics
New AI attack hides data-theft prompts in downscaled images
bleepingcomputer.com·11h·
Discuss: Hacker News
🕵️Vector Smuggling
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·5h
🎯Content Recommendation
Capture Checking in Scala
nrinaudo.github.io·1d·
Discuss: Hacker News
🧪Binary Fuzzing
2.5B Gmail users endangered after Google database hack
pcworld.com·1d·
Discuss: Hacker News
🔓Hacking
AI Agents Need Data Integrity
schneier.com·3d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Smashing up a 3D printed ghost gun won't be enough to prevent CSIs from retrieving data for forensic analysis - here's why
techradar.com·21h
💿Optical Forensics
A Bitcoin Core Code Analysis
binaryigor.com·18h·
Discuss: Hacker News
🧬Bitstream Evolution
AI Tools Now Use Radar to Wiretap Your Phone from 10 Feet Away
offthegridnews.com·5d·
Discuss: Hacker News
👂Audio Evidence
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap