🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos History

Authentication Evolution, MIT Athena, Domain Architecture, Ticket Forensics

Powered by DigitalOcean Hatch: Why Uxify’s Founders Always Choose DigitalOcean
digitalocean.comΒ·1d
πŸ”“Open Source Software
Tech partner spotlight: Jamf and AuthenTrend
jamf.comΒ·55m
πŸ”PKI Archaeology
More SPICEyness
self-issued.infoΒ·2d
πŸ“‹Format Specification
The AWS Survival Guide for 2025: A Field Manual for the Brave and the Bankrupt
lastweekinaws.comΒ·2d
πŸ–₯️Self-hosted Infrastructure
Critical Analysis of the Meshtastic Protocol
disk91.comΒ·1dΒ·
Discuss: Hacker News
πŸ•ΈοΈMesh Networking
Recover 15–50% of web analytics data lost to ad blockers and privacy tools
dataunlocker.comΒ·2dΒ·
Discuss: Hacker News
πŸ”BitFunnel
Microsoft and OpenAI's AGI Fight Is Bigger Than a Contract
wired.comΒ·7hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
Keep secrets and configmaps syncronized across clusters and namespaces
github.comΒ·2dΒ·
Discuss: Hacker News
πŸ“¦Container Security
Setting up Your Own Certificate Authority for Development: Why and How., (Wed, Jul 9th)
isc.sans.eduΒ·2d
πŸ”Certificate Analysis
McDonald’s AI recruiting platform had a really embarrassing security flaw - and it left millions of users open to attack
techradar.comΒ·1d
πŸ”“Hacking
Machine Learning Fundamentals: data augmentation project
dev.toΒ·2hΒ·
Discuss: DEV
⚑Incremental Computation
Supercharge your AI workflows by connecting to SageMaker Studio from Visual Studio Code
aws.amazon.comΒ·1d
πŸ”ŒArchive APIs
AI Agent Smart Contract Exploit Generation
arxiv.orgΒ·2d
πŸ§ͺProtocol Fuzzing
Satellites, Sovereignty, and the Next Internet Revolution
hackernoon.comΒ·3d
πŸ•ΈοΈMesh Networking
Warp Terminal: The AI-Powered Command Line for Frontend Developers
dev.toΒ·6hΒ·
Discuss: DEV
πŸ–₯️Modern Terminals
Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)
labs.watchtowr.comΒ·3dΒ·
Discuss: Hacker News
πŸ”“Hacking
Evaluation of OpenAI o1: Opportunities and Challenges of AGI
arxiv.orgΒ·2d
πŸ—οΈOAIS Model
Unauthorized Data Exposure via Range Queries in ServiceNow ACLs – CVE-2025-3648
research.kudelskisecurity.comΒ·1d
πŸ”“LDAP Injection
Show HN: gRPC to MCP Gateway – Let AI models call your existing gRPC services
github.comΒ·17hΒ·
Discuss: Hacker News
⚑gRPC
Anubis guards gates against hordes of LLM bot crawlers
theregister.comΒ·2d
πŸš€Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap