🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Recommended email providers • Cory Dransfeldt
coryd.dev·5h
🏠Personal Archives
Surveillance is inequality’s stabilizer
doctorow.medium.com·5h
🧲Magnetic Philosophy
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.uk·1d
🧲RISC-V Archaeology
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·2d
🔐Quantum Security
Creative Commons Introduces CC Signals: A New Social Contract for the Age of AI
creativecommons.org·47m·
Discuss: Hacker News
⚖️Emulation Ethics
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.com·1d·
Discuss: Hacker News
🚀Indie Hacking
The Future of AI-Augmented Infrastructure: Letting AI Handle the Terraform Tax
devops.com·12h
🌊Stream Processing
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·10h
🎯Threat Hunting
Who are your MCP servers talking to?
dev.to·7h·
Discuss: DEV
📦Container Security
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·2d
⚔️Lean Tactics
What is smishing?
proton.me·3h
🔐Hash Functions
All you wanted to know about sw vulnerabilities…but were too busy to look into - DevConf.CZ 2025
youtube.com·14h
🔐CBOR
Passwordless Auth: a JSON-Based Approach for modern authentication w/ SSSD & GNOME - DevConf.CZ 2025
youtube.com·14h
🔓Password Cracking
5 Ways to Automate Security and Compliance in a Cloud-First World
hackernoon.com·9h
🔓Hacking
VReaves: Eavesdropping on Virtual Reality App Identity and Activity via Electromagnetic Side Channels
arxiv.org·2d
✋Tactile Computing
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·2d
🔢Bitwise Algorithms
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.org·3d
🔒Language-based security
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·14h
🔓Hacking
What’s the Difference Between Ethical Hacking and Cybersecurity Operations?
securityscorecard.com·1d
🕵️Penetration Testing
How to Write a Software Project Proposal: Complete Template & Guide
dev.to·17h·
Discuss: DEV
🦋Format Metamorphosis
Loading...Loading more...
AboutBlogChangelogRoadmap