🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Language-based security

information-flow

AI Teams Contend With Synthetic Data’s Jekyll/Hyde Roles
cacm.acm.org·5h
🔍Vector Forensics
AI in cybersecurity operations
jwgoerlich.com·1d
🛡Cybersecurity
Claude Code Gets a Second Opinion from GPT-5
proxymock.io·1d·
Discuss: Hacker News
⚡Proof Automation
Why Semantic Layers Matter—and How to Build One with DuckDB
ssp.sh·2d
🗄️Database Internals
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
DIAC ∞ 2: A Post-Quantum, P=NP-Resistant Hybrid Encryption System
osf.io·4h·
Discuss: Hacker News
🔐Quantum Security
Pyrat TryHackMe Walkthrough: Step-by-Step Beginner’s Guide to Easy Level CTF with Reverse Shell and…
infosecwriteups.com·1d
🔓Password Cracking
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.ai·3h·
Discuss: Hacker News
🔗Constraint Handling
Learning ON Large Datasets Using Bit-String Trees
arxiv.org·18h
🗂️Vector Databases
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·1d·
Discuss: Hacker News
🔐Archive Encryption
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·1d
🛡Cybersecurity
Claude Code's 19 cent Parser
blogger.com·1d
🔧Binary Parsers
Model-based Testing Distributed Systems with P Language (2021)
mydistributed.systems·7h·
Discuss: Lobsters, Hacker News, r/programming
📞Session Types
TypeScript Cookbook • Stefan Baumgartner & Peter Kröner
youtube.com·9h
🎯Gradual Typing
How Does a Firewall Work Step by Step
kalilinuxtutorials.com·2d·
Discuss: Hacker News
🌐Network Security
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·18h
🎯Content Recommendation
Avoiding the AI Agent Reliability Tax: A Developer’s Guide
thenewstack.io·6h
💾Persistence Strategies
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
github.com·1d·
Discuss: Hacker News
🔐Archive Encryption
Chatting with Unmesh about building language with LLMs
martinfowler.com·8h
💻Programming languages
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.com·1d
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap