🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Workplace jargon hurts employee morale, collaboration, study finds
phys.org·3h
🌱Personal Wikis
Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.com·9h
🔐Capability Systems
Representative Line: Not What They Meant By Watching "AndOr"
thedailywtf.com·8h
🔗Concatenative Programming
⌥ The U.S.’ Increasing State Involvement in the Tech Industry
pxlnv.com·12h
🛡Cybersecurity
U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·6h
🎫Kerberos Exploitation
Chatting with Unmesh about building language with LLMs
martinfowler.com·1h
💻Programming languages
AI Agents Need Data Integrity
schneier.com·4d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Google’s URL Context Grounding: Another Nail in RAG’s Coffin?
towardsdatascience.com·2h
🌀Brotli Internals
Smashing up a 3D printed ghost gun won't be enough to prevent CSIs from retrieving data for forensic analysis - here's why
techradar.com·1d
💿Optical Forensics
A Bitcoin Core Code Analysis
binaryigor.com·1d·
Discuss: Hacker News
🧬Bitstream Evolution
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
hackernoon.com·1d
🔄Archival Workflows
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Quality Precision
lesswrong.com·21h·
Discuss: Hacker News
✅FLAC Verification
Shelling Out Is Selling Out
petersobot.com·13h·
Discuss: Hacker News
🎞️MKV Forensics
Hackers Lied In Wait, Then Knocked Out Iran Ship Comms
darkreading.com·18h
🔓Hacking
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.com·11h·
Discuss: Hacker News
🔐Homomorphic Encryption
I am smarter than ChatGPT (at Clues by Sam)
goose.leaflet.pub·19h·
Discuss: Hacker News
🔲Cellular Automata
Types of Dimensions in a Data Warehouse (Beginner’s Guide)
dev.to·10h·
Discuss: DEV
📇Indexing Strategies
DiCache: Let Diffusion Model Determine Its Own Cache
arxiv.org·11h
🧠Machine Learning
Learning ON Large Datasets Using Bit-String Trees
arxiv.org·11h
🗂️Vector Databases
Loading...Loading more...
AboutBlogChangelogRoadmap