🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Protocols

HTTP/3, QUIC, WebTransport, gRPC

Getting a Raspberry Pi 5
fbrs.io·29m
🔌Single Board PC
Building secure messaging is hard: A nuanced take on the Bitchat security debate
blog.trailofbits.com·1d
🧪Protocol Fuzzing
No record left behind: How Warpstream can withstand regional outages
warpstream.com·1d·
Discuss: Hacker News
🌐Edge Preservation
Strengthening cybersecurity communities at Phoenix Summit 2025
blog.apnic.net·1d
🎯Threat Hunting
APIs Are Eating the Internet—And Hackers Are Eating APIs
hackernoon.com·3d
🔓Hacking
Show HN: DOMTranslator package to translate text nodes in DOM
github.com·3h·
Discuss: Hacker News
📝Text Compression
How to Add Generative UI to Any React App in 5 Minutes
dev.to·1d·
Discuss: DEV
🔗Concatenative Programming
The .a File Is a Relic: Why Static Archives Were a Bad Idea All Along
medium.com·12h·
Discuss: Hacker News, r/C_Programming
🔗Static Linking
What is an Entity Component System architecture for game development? (2012)
richardlord.net·1d·
Discuss: Hacker News
🔒WASM Capabilities
Replay institutional trades for debugging and testing (QuantReplay, open-source)
github.com·1d·
Discuss: Hacker News
🔄Sync Engine
Show HN: Tanu – High-performance WebAPI testing framework for Rust
github.com·3d·
Discuss: Hacker News
🦀Rust Borrowing
6 Design Principles for Edge Computing Systems
thenewstack.io·2d
🌐Edge Preservation
Proof-theoretic Semantics for First-order Logic
arxiv.org·1d
🏗️Constructive Logic
WhisperVoice: Hide Secret Messages Inside Natural Voice Notes
dev.to·3h·
Discuss: DEV
🎙️Whisper
How to actually use Model Context Protocol
seangoedecke.com·2d·
Discuss: Hacker News
⚡Proof Automation
LuCI on MGMT - Day 7
dev.to·3d·
Discuss: DEV
📻Homebrew Protocols
How to Access Grok 4 API
dev.to·1d·
Discuss: DEV
🔗Hypermedia APIs
HTML to PDF Conversion using Modern .NET Core Frameworks: The Ultimate Guide
hackernoon.com·2d
📄PDF Internals
Show HN: Open-source project that use LLM as deception system
news.ycombinator.com·4h·
Discuss: Hacker News
🕵️Vector Smuggling
From Goliath Idea to Reality with Bolt
dev.to·1d·
Discuss: DEV
🌊Streaming Systems
Loading...Loading more...
AboutBlogChangelogRoadmap