🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔲 Lattice Cryptography

Post-quantum Security, Ring-LWE, Archive Encryption, Long-term Confidentiality

Do home security systems require a subscription? Plans, costs and features explained
the-independent.com·15h
🏠Home Automation
Reverse engineering a basic gym app
blog.davidv.dev·2d
🏺ZIP Archaeology
Critical Infrastructure Security Is a Critical Concern
darkreading.com·2d
🛡Cybersecurity
Open source microprocessors with Jan Pleskac
opensourcesecurity.io·4d
🔬Hardware Forensics
VMware Prevents Some Perpetual License Holders From Downloading Patches
tech.slashdot.org·9h
📦Container Security
TreeView - A Go module for building, navigating, and displaying hierarchical data in the terminal.
github.com·7h·
Discuss: r/golang
🌳Incremental Parsing
LED-pumped room-temperature solid-state maser
nature.com·2d·
Discuss: Hacker News
🔬Optical Physics
DeLLMa: Decision Making Under Uncertainty with Large Language Models
dellma.github.io·1d·
Discuss: Hacker News
🔗Constraint Handling
The Rise of Immutable Linux Distros: A New Era of Security and Stability
itprotoday.com·1d·
Discuss: Hacker News
🔌Operating system internals
Machine Learning Fundamentals: gradient descent example
dev.to·7h·
Discuss: DEV
⚡Incremental Computation
Astronomers calculate that the universe will die in 33 billion years — much sooner than we thought
space.com·9h·
Discuss: Hacker News
🔲Cellular Automata
Closing the complexity gap of the double distance problem
arxiv.org·1d
🧮Kolmogorov Complexity
Living Memory Attacks: Code Injection Without Files
infosecwriteups.com·13h
🧠Memory Forensics
Metastable mystery: Scientists answer 20-year-old question in epigenetics
phys.org·6h
🧬Copy Number Variants
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers
arxiv.org·1d
💻Local LLMs
MultiNRC: A Challenging and Native Multilingual Reasoning Evaluation Benchmark for LLMs
arxiv.org·20h
🧮SMT Solvers
Bipartite Patient-Modality Graph Learning with Event-Conditional Modelling of Censoring for Cancer Survival Prediction
arxiv.org·1d
🧠Machine Learning
Building Jetflow: a framework for flexible, performant data pipelines at Cloudflare
blog.cloudflare.com·1d·
Discuss: Hacker News
🌊Stream Processing
Acceleration of Gossip Algorithms through the Euler-Poisson-Darboux Equation
arxiv.org·3d
🕸️Network Topology
RAG vs Fine-Tuning: Which One Wins the Cost Game Long-Term?
dev.to·17h·
Discuss: DEV
🌊CBOR Streaming
Loading...Loading more...
AboutBlogChangelogRoadmap