🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔲 Lattice Cryptography

Post-quantum Security, Ring-LWE, Archive Encryption, Long-term Confidentiality

That Was The Week That Was – 30th August 2025
brendandawes.com·2d
📋PREMIS Events
Study finds caffeine can weaken effectiveness of certain antibiotics
uni-tuebingen.de·7h·
Discuss: Hacker News
☕Coffee Chemistry
Auto-enrolment: The quiet pension reform that could transform Europe’s economy
euronews.com·1d
⚙Backus-Naur Form
A Unique, High-Tech (Family) Computer
nicole.express·11h·
Discuss: Hacker News
🕹️Retro Gaming
The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft
krebsonsecurity.com·1h·
Discuss: Hacker News
🎫Kerberos Attacks
Are farmed oysters, mussels and clams the ultimate green foods?
newscientist.com·7h
🧊Arctic Storage
How To Connect Custom Domain with EC2 Instance?
blog.devops.dev·5h
🌐DNS over QUIC
Trump's DOJ told companies how to avoid getting prosecuted. Here's how one company pulled it off.
businessinsider.com·11h
🎫Kerberos Exploitation
Amped Authenticate’s Video Mode: Raising The Bar For Forensic Video Analysis
forensicfocus.com·4d
🎞️MKV Forensics
I was a VP at BlackRock before I started my own company. I saw 2 types of people in finance that helped me decide to pivot careers.
businessinsider.com·11h
🏠Personal Archives
Linuxiac Weekly Wrap-Up: Week 35 (Aug 24 – 31, 2025)
linuxiac.com·23h
🔌Operating system internals
Notes on an overheard conversation between a prescriptivist and a descriptivist
boston.conman.org·1d
🔍Archive Semantics
Krish Naik: Introduction To Undertsanding RAG(Retrieval-Augmented Generation)
dev.to·1d·
Discuss: DEV
📊Multi-vector RAG
One of the most in-demand skills in Silicon Valley is a software program released 40 years ago
businessinsider.com·1d
🍎Apple Computing
Paradigms of Intelligence Team
github.com·6d·
Discuss: Hacker News
🔲Cellular Automata
Sony is hosting a State of Play showcase for 007 First Light on September 3
engadget.com·8h
🕹️Retro Gaming
Can You Recognize a Deepfake? Here’s What You Need to Know!
dev.to·1d·
Discuss: DEV
📼Cassette Hacking
🪄 Scopes, Closures, and Decorators in Python: A Deep Dive Adventure
dev.to·4d·
Discuss: DEV
⬆️Lambda Lifting
Automating Venue Research as a Musician
dev.to·17h·
Discuss: DEV
🌀Brotli Internals
Building a Competitive 'Deal Hunter' Agent Using n8n + BrightData Real-Time Web Data
dev.to·1d·
Discuss: DEV
🌀Brotli Internals
Loading...Loading more...
AboutBlogChangelogRoadmap