🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Network Archaeology

Packet History, Protocol Evolution, Historical Traffic Analysis, Communication Heritage

1500 Archers on a 28.8: Network Programming in Age of Empires and Beyond
gamedeveloper.com·20h·
Discuss: Hacker News
🖥️Game Emulation
Adaptive Learning for IRS-Assisted Wireless Networks: Securing Opportunistic Communications Against Byzantine Eavesdroppers
arxiv.org·10h
🧠Machine Learning
Scaling AI through our global network footprint
blog.arelion.com·7h
🕸️Mesh Networking
Let Me Preface That…
systemsapproach.org·1d
🌐BGP Security
Far-Flung Modems
tedium.co·12h
💾vintage computing
Europol mapped a criminal network by analyzing encrypted comms - and then seized an entire hotel while busting a multi-million euro laundering ring
techradar.com·1h
📡Protocol Forensics
Building a Tech Zeitgeist Machine: News Harvesting, Dirty Data, and the Audacity of Mr. Spruce
dev.to·1d·
Discuss: DEV
📰RSS Archaeology
upgrading my network design
i.redd.it·3d·
Discuss: r/homelab
🖥Home Lab Setup
Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
It's the certificates, stupid!
reverse.put.as·15h
🏺Kerberos Archaeology
6 Things I Learned While Building an Incident Response Simulation (IR Sim 101)
infosecwriteups.com·1d
🎯Threat Hunting
I expanded my Wi-Fi 7 network by adding a TP-Link Deco BE25-Outdoor satellite, quadrupling performance for long-distance connections in my backyard
tomshardware.com·2h
📡Bluetooth Archaeology
Mind the IP Gap: Measuring the impact of IPv6 on DNS censorship
arxiv.org·10h
🌐DNS Security
A directed two-mode network approach to desirability on a mobile dating app
journals.plos.org·15h·
Discuss: Hacker News
🎯Recommendation Metrics
Why Kafka Capacity Planning Is So Challenging?
kaimingwan.substack.com·1h·
Discuss: Substack
🌊Streaming Systems
How Salesforce Delivers Reliable, Low-Latency AI Inference
engineering.salesforce.com·1d
🌊Stream Processing
Decentralized Proof-of-Location systems for trust, scalability, and privacy
nature.com·19h·
Discuss: Hacker News
🤝Distributed Consensus
How Graphs Boost LLM Precision and Explainability in Cybersecurity
hackernoon.com·20h
💻Local LLMs
The PC and Internet Revolution in Rural America
complete.org·10h·
Discuss: Hacker News
💾vintage computing
Unlocking Scalability: A Deep Dive into Mixture of Experts (MoE) for Modern LLMs
dev.to·12h·
Discuss: DEV
🧠Intelligence Compression
Loading...Loading more...
AboutBlogChangelogRoadmap