🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔲 Lattice Cryptography

Post-quantum Security, Ring-LWE, Archive Encryption, Long-term Confidentiality

Strangers in the Family Album: Reflections on Soviet Amateur Photography
publicbooks.org·21h
🔐Soviet Cryptography
Authenticate Update 38211: Introducing the Perspective Filter, Improvements to the Video Mode, and More!
blog.ampedsoftware.com·23h
📐Projective Geometry
Identity is the New Perimeter: Why Your IdP Isn’t Enough
tenable.com·2d
✅Archive Fixity
Re: Multiple vulnerabilities in the web management interface of Intelbras routers
seclists.org·2d
🛣️BGP Hijacking
Zero to Mastery: [July 2025] Python Monthly Newsletter 🐍
zerotomastery.io·1d
⚡Homebrew CPUs
2000 words about arrays and tables
buttondown.com·1d·
Discuss: Lobsters, Hacker News, r/programming
🗂Data structures
Crafting your own Static Site Generator using Phoenix (2023)
fly.io·20h·
Discuss: Lobsters, Hacker News
🦋Format Metamorphosis
EIFO and the Novo Nordisk Foundation Acquire the Most Powerful Quantum Computer
novonordiskfonden.dk·4d·
Discuss: Hacker News
⚛️Quantum Tape
Cybercrooks attached Raspberry Pi to bank network and drained ATM cash
theregister.com·2h
🔓Hacking
A Tale of Practical Keylogger Forensics
research.hisolutions.com·4d·
Discuss: Hacker News
🔍NTLM Forensics
[D] First research project – feedback on "Ano", a new optimizer designed for noisy deep RL (also looking for arXiv endorsement)
reddit.com·3d·
Discuss: r/MachineLearning
🧠Machine Learning
The big secret that Big AI doesn't want you to know
prettygoodblog.com·1d·
Discuss: Hacker News
🔲Cellular Automata
Amazon Strands Agents SDK: A technical deep dive into agent architectures and observability
aws.amazon.com·20h
🔒WASM Capabilities
From Innocent Messages to Total Takeover: How I Hacked a Professional Network!
infosecwriteups.com·8h
🔓Hacking
Dark Reading Confidential: Funding the CVE Program of the Future
darkreading.com·23h
✅Archive Fixity
We Asked 100+ AI Models to Write Code. Here’s How Many Failed Security Tests
veracode.com·11h·
Discuss: Lobsters, Hacker News
📜Proof Carrying Code
🌐Developing Agents Isn’t About Writing Logic—It’s About Deploying Behavior
dev.to·11h·
Discuss: DEV
🔒WASM Capabilities
Recovering Diagnostic Value: Super-Resolution-Aided Echocardiographic Classification in Resource-Constrained Imaging
arxiv.org·8h
🤖Advanced OCR
Can You Trust an LLM with Your Life-Changing Decision? An Investigation into AI High-Stakes Responses
arxiv.org·2d
💻Local LLMs
Dahua Camera flaws allow remote hacking. Update firmware now
securityaffairs.com·1d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap