🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕸️ Mesh Networking

Decentralized Communication, Offline Networks, Peer Discovery, Resilient Protocols

Swedish startup unveils Starlink alternative — that Musk can’t switch off
thenextweb.com·2d
🇷🇺Russian Computing
How moving from AWS to Bare-Metal K8s saved us $230,000 /yr.
oneuptime.com·2d·
Discuss: Hacker News, r/devops
🖥️Self-hosted Infrastructure
Permacomputing
inkdroid.org·13h
🧲Magnetic Philosophy
I tried Intermapper, a solid visual network monitoring but showing its age
techradar.com·2d
📊Homelab Monitoring
Air gap security: why disconnected doesn't mean defenseless
runzero.com·4d
🏠Homelab Security
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.com·2d
🛡️CLI Security
Turning Neighborhoods into Communities
supernuclear.substack.com·3h·
Discuss: Substack
🤝Consensus Networks
The "impossibly small" Microdot web framework
lwn.net·7h·
Discuss: Hacker News
🌐Web Standards
China-linked Silk Typhoon APT targets North America
securityaffairs.com·8h
🔓Hacking
CLEC: Competitive Local Exchange Carrier
en.wikipedia.org·1d·
Discuss: Hacker News
📡Network Calculus
Don't pick weird subnets for embedded networks, use VRFs
blog.brixit.nl·2d·
Discuss: Hacker News
🏠HomeLab
From 5G RAN Queue Dynamics to Playback: A Performance Analysis for QUIC Video Streaming
arxiv.org·1d
🎥Streaming Codecs
Energy-Efficient Routing Algorithm for Wireless Sensor Networks: A Multi-Agent Reinforcement Learning Approach
arxiv.org·2d
🕸️Network Topology
Hacker and Physicist – A Tale of "Common Sense"
supasaf.com·1d·
Discuss: Hacker News
🔐Cryptographic Archaeology
Ow Dynamic K8s Sandboxes Can Improve Dora Metrics
signadot.com·2d·
Discuss: Hacker News, r/devops
👁️Observatory Systems
The Great Game: Game Theory for Collective Intelligence
foundation.symbiquity.ai·3h·
Discuss: Hacker News
🔲Cellular Automata
AI Agents Need Data Integrity
schneier.com·1d·
Discuss: www.schneier.com
🛡️Preservation Proofs
Amid Service Disruption, Colt Telecom Confirms 'Criminal Group' Accessed Their Data, As Ransomware Gang Threatens to Sell It
it.slashdot.org·2h
🔗Data Provenance
Value Exchange in Cybersecurity
paloaltonetworks.com·4d
🤝Distributed Consensus
AI working with Infra? Sounds like a terrible idea but we made it work
blog.railway.com·3d·
Discuss: Hacker News
🎬AV1 Encoding
Loading...Loading more...
AboutBlogChangelogRoadmap