🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.com·12h
🔐Capability Systems
Representative Line: Not What They Meant By Watching "AndOr"
thedailywtf.com·12h
🔗Concatenative Programming
Apple´s Tim Cook battle results
hugston.com·3h·
Discuss: Hacker News
🔒Privacy Archives
Chatting with Unmesh about building language with LLMs
martinfowler.com·5h
💻Programming languages
AI Agents Need Data Integrity
schneier.com·4d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Smashing up a 3D printed ghost gun won't be enough to prevent CSIs from retrieving data for forensic analysis - here's why
techradar.com·1d
💿Optical Forensics
A Bitcoin Core Code Analysis
binaryigor.com·1d·
Discuss: Hacker News
🧬Bitstream Evolution
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·22h·
Discuss: Hacker News
✅Format Validation
Intentional Risk Management
leadinginproduct.com·8h·
Discuss: Hacker News
🎯Threat Hunting
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
hackernoon.com·1d
🔄Archival Workflows
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Quality Precision
lesswrong.com·1d·
Discuss: Hacker News
✅FLAC Verification
Hackers Lied In Wait, Then Knocked Out Iran Ship Comms
darkreading.com·21h
🔓Hacking
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.com·15h·
Discuss: Hacker News
🔐Homomorphic Encryption
Types of Dimensions in a Data Warehouse (Beginner’s Guide)
dev.to·13h·
Discuss: DEV
📇Indexing Strategies
DiCache: Let Diffusion Model Determine Its Own Cache
arxiv.org·14h
🧠Machine Learning
Workplace jargon hurts employee morale, collaboration, study finds
phys.org·6h
🌱Personal Wikis
Learning ON Large Datasets Using Bit-String Trees
arxiv.org·14h
🗂️Vector Databases
Google’s URL Context Grounding: Another Nail in RAG’s Coffin?
towardsdatascience.com·5h
🌀Brotli Internals
Shelling Out Is Selling Out
petersobot.com·17h·
Discuss: Hacker News
🎞️MKV Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap