๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ NetworkProtocols

TLS, Formal Specification, Protocol State Machines, Verification

๐Ÿ” Introducing EMCL โ€“ A Secure Protocol for AI Agents to Call Tools
dev.toยท10hยท
Discuss: DEV
๐ŸŒProtocol Synthesis
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท2d
๐ŸŒDNS Security
Functional Abstract Interpretation
simon.peytonjones.orgยท1dยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.comยท3hยท
Discuss: Hacker News
๐ŸŒWASI
A distributed systems reliability glossary
antithesis.comยท10hยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
netlab 25.07: Summaries and Confederations
blog.ipspace.netยท18h
๐Ÿ“ปHomebrew Protocols
Introducing TCP-in-UDP solution (eBPF)
blog.mptcp.devยท16hยท
Discuss: Lobsters, Hacker News
๐ŸŒNetwork Protocols
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.ilยท3hยท
Discuss: Hacker News
๐ŸŽฏInteractive Provers
Looking for Home Network Design Best Practices & Setup Templates
reddit.comยท20hยท
Discuss: r/homelab
๐Ÿ HomeLab
FSM Library for Embedded C Projects
hackster.ioยท2d
๐Ÿฆ€Embedded Rust
Show HN: From Zod schema to agent-ready MCP server โ€“ minimal, typed, deployable
github.comยท11hยท
Discuss: Hacker News
๐Ÿ”CBOR
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท1d
๐Ÿ”Cryptographic Archaeology
Dry Run: Your Kubernetes network policies with Calico staged network policies
tigera.ioยท11h
๐Ÿ“ฆContainer Security
Python Fundamentals: build
dev.toยท13hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.comยท1d
๐ŸคDistributed Consensus
MCP: A Practical Security Blueprint for Developers
thenewstack.ioยท5h
๐Ÿ”“Hacking
Model Context Protocol (MCP)
leimao.github.ioยท2d
๐Ÿ“‹Protocol Buffers
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.comยท1d
๐ŸŽซKerberos Exploitation
Wi-Fi: Twenty-Five Years and Counting
arxiv.orgยท21h
๐Ÿ“กNetwork Archaeology
A2A Protocol ADK guide โ€“ hands-on demo for building agents
a2aprotocol.aiยท17hยท
Discuss: Hacker News
๐Ÿค–Network Automation
Loading...Loading more...
AboutBlogChangelogRoadmap