🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Linear Types

Resource Management, Rust Ownership, Session Types, Protocol Safety

Samsung's End of Summer Sale Includes Steep Discounts on Monitors, TVs, and More
macrumors.com·8h
🔌Operating system internals
Anatomy of a Red Scare
jewishcurrents.org·1d
🔐Soviet Cryptography
State of the software engineering job market in 2025
newsletter.pragmaticengineer.com·8h
🔄Language Evolution
Scientists Build Quantum Computer That Snaps Together Like LEGOs
scitechdaily.com·22h
⚛️Quantum Tape
David Paul Morris/Bloomberg
bloomberg.com·1d
🔓Hacking
The Hotel Chocolat velvetiser gets a major switch up – here’s my honest review
the-independent.com·16h
☕Coffee
An LLM is a lossy encyclopedia
simonwillison.net·4d·
Discuss: Hacker News
💻Local LLMs
Dubious security vulnerability: Remembering passwords for recently-opened ZIP files
devblogs.microsoft.com·10h
💣ZIP Vulnerabilities
Fed Governor Lisa Cook v. Trump: “That Mortgage Document Doesn’t Say What You Think It Says”
nakedcapitalism.com·1d
🏠Personal Archives
UK Consumer Study Sounds Alarm About Security Risks of Mobile Wallets
nakedcapitalism.com·14h
🔤EBCDIC Privacy
Why small business owners are more likely to be right wing
phys.org·6h
🏠Personal Archives
Introduction to Writing Good Puzzle Hunt Puzzles
mit.edu·2d·
Discuss: Hacker News
📐Proof Assistants
MrBeast has plans for a phone company in the mold of Ryan Reynolds' Mint Mobile
businessinsider.com·10h
🎥Streaming Codecs
Trump’s use of National Guard during Los Angeles immigration protests is illegal, a judge rules
mercurynews.com·10h
💻Local first
Above the Knee review – man struggles with body integrity dysmorphia in gory amputation horror
theguardian.com·14h
❄️Nordic Design Philosophy
Print2Volume: Generating Synthetic OCT-based 3D Fingerprint Volume from 2D Fingerprint Image
arxiv.org·1d
💿Optical Forensics
Cybersecurity Snapshot: Agentic AI Security in Focus With Anthropic’s Chilling Abuse Disclosure and CSA’s New Identity Protection Framework
tenable.com·4d
🔓Hacking
BW21-CBV-Kit——Home Video Monitoring and Playback System
hackster.io·6d
🎬Video Codecs
AI vs ML vs MLOps: A Developer’s Roadmap to Getting Started
dev.to·3d·
Discuss: DEV
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Unlocking Multimodal Video Transcription with Gemini
towardsdatascience.com·4d
✅Verification Codecs
Loading...Loading more...
AboutBlogChangelogRoadmap