Feeds to Scour
SubscribedAll
Scoured 13750 posts in 1.13 s
Building Cryptographic Audit Trails for AI Trading Systems: A Deep Dive into RFC 6962-Based Verification
dev.to·14h·
Discuss: DEV
🌳Archive Merkle Trees
Preview
Report Post
From Information to Intelligence: A Practical Understanding of OSINT (Trace Labs OSINT Educational…
medium.com·15h
🔎OSINT Techniques
Preview
Report Post
A Practical Guide to Build Secure MCP Servers
go.mcptotal.io·18h·
Discuss: Hacker News
🌐DNS Security
Preview
Report Post
Investigating Record-Based Domain Models
coding-mischief.com·15h·
Discuss: Hacker News
🔢Denotational Semantics
Preview
Report Post
ThorneShadowbane/ai-code-guard: Detect security vulnerabilities in AI-generated code
github.com·8h·
Discuss: Hacker News
Proof Automation
Preview
Report Post
Choosing Secrets Manager for Homelab
prezu.ca·2h
🦠Parasitic Storage
Preview
Report Post
Hierarchical reinforcement learning
danmackinlay.name·10h
🔲Cellular Automata
Preview
Report Post
Securing the Knowledge Layer: Enterprise Security Architecture Frameworks for Proprietary Data Integration With Large Language Models
securityboulevard.com·4d
🔒WASM Capabilities
Preview
Report Post
The Key to Agentic Success? BASH Is All You Need
thenewstack.io·11h
🐚Shell Automation
Preview
Report Post
FUSE is All You Need – Giving agents access to anything via filesystems
jakobemmerling.de·1d·
Discuss: Hacker News
💿WORM Storage
Preview
Report Post
Ogg Encapsulation for the Opus Audio Codec
rfc-editor.org·1d
FLAC Verification
Preview
Report Post
Show HN: Engineering Schizophrenia: Trusting Yourself Through Byzantine Faults
news.ycombinator.com·4h·
Discuss: Hacker News
🤝Paxos Consensus
Preview
Report Post
oss-sec: The Curious Case of Stack Pivot Detection
seclists.org·6h·
🔓Decompilation
Preview
Report Post
Using Keybase and PGP to Build Certificate Trust Chains
blog.certisfy.com·1d·
Discuss: Hacker News
🔐Certificate Analysis
Preview
Report Post
Why Your AI Agents Need a Shell (And How to Give Them One Safely)
dev.to·15h·
Discuss: DEV
🐚Shell Automation
Preview
Report Post
Metadata Protection in Instant Messaging Applications: A Review
passthesalt.ubicast.tv·15h·
Discuss: Hacker News
🏺ZIP Archaeology
Preview
Report Post
Out-of-Context: Constrained Tool Based Exploration of Context
gojiberries.io·1d·
Discuss: Hacker News
🌳Context free grammars
Preview
Report Post
Subagents, Commands and Skills Are Converging
vivekhaldar.com·22h·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post
Fantasizing AI – Caddy Reverse Proxy and Basic Authentication
blog.wirelessmoves.com·2d
🏠Homelab Automation
Preview
Report Post
AI’s Bottleneck Isn’t Models or Tools, It’s Security
zkorman.com·6h·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help