🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 NetworkProtocols

TLS, Formal Specification, Protocol State Machines, Verification

SEPT. 3rd COLLOQUIUM: Eric Zaslow (Northwestern University)
math.columbia.eduΒ·16h
🌐Computational Topology
Back in Action on Plasma (Mobile)
vizzzion.orgΒ·21h
πŸ•ΈοΈWASM Archives
A note about eventual consistency - Part 2
ufried.comΒ·10h
πŸ—„οΈDatabase Sharding
Getting Started With Kubevirt
codeofconnor.comΒ·3d
🏠HomeLab
Intelligence Brief: UNC6040 Threat Assessment
cstromblad.comΒ·2d
🎫Kerberos History
slash - a customizable, vibrant, and modern shell
github.comΒ·1d
🐚Bash Monads
I open-sourced a protocol to create auditable logs for AI agents
medium.comΒ·2dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
The Resurgence of IoT Malware: Inside the Mirai-Based Gayfemboy Botnet Campaign
fortinet.comΒ·2dΒ·
Discuss: Hacker News
🌐DNS Security
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.orgΒ·2dΒ·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
⚑Hardware Transactional Memory
The Adaptive Communication Framework (ACF) for Extraterrestrial Intelligence Discovery
arxiv.orgΒ·2d
πŸ“°RSS Archaeology
MCP Gateways: Managing Multiple Servers Like a Pro
dev.toΒ·2dΒ·
Discuss: DEV
πŸ•ΈοΈMesh Networks
The Cyber Resilience Act: Fear, Confusion β€” And Reassurance
thenewstack.ioΒ·13h
πŸ”“Open Source Software
Self-Healing Network of Interconnected Edge Devices Empowered by Infrastructure-as-Code and LoRa Communication
arxiv.orgΒ·4d
πŸ•ΈοΈMesh Networking
New research claiming passkeys can be stolen is pure nonsense
arstechnica.comΒ·21hΒ·
Discuss: Lobsters, Hacker News, Hacker News
πŸ”“Hacking
Blind Source Separation-Enabled Joint Communication and Sensing in IBFD MIMO Systems
arxiv.orgΒ·6h
⏱️SMPTE Timecode
Building Libra: the story of creating a modern label-manufacturing website (and everything under the hood)
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“„Document Digitization
Popular Nx Build System NPM Package Compromised with Data Stealing Malware
stepsecurity.ioΒ·2dΒ·
Discuss: Hacker News
πŸ”“Open Source Software
Engineers send quantum signals with standard Internet Protocol
phys.orgΒ·16hΒ·
Discuss: Hacker News
βš›οΈQuantum Codecs
Hacking group NoName057(16) remains the most prolific DDoS player as automation, AI, and rogue LLMs make Tbps attacks a common occurrence
techradar.comΒ·2d
πŸ”“Hacking
The Power of Digital Twins in Cybersecurity
cacm.acm.orgΒ·1d
πŸ”Capability Systems
Loading...Loading more...
AboutBlogChangelogRoadmap