🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Earth Pulsates Every 26 Seconds. No One Knows Why.
popularmechanics.comΒ·1h
πŸ“‘Frequency Archaeology
Security Chat 6.0: A Night of Ideas, Innovation, and Community in Zurich
raffy.chΒ·2h
🎯Threat Hunting
SOC Visibility Quad: Why Application Telemetry Completes the Framework | Oligo Security
oligo.securityΒ·2h
πŸ‘οΈSystem Observability
Denmark proposes copyright laws to protect against deepfakes
lsj.com.auΒ·1dΒ·
Discuss: Hacker News
βš–οΈLegal Compliance
Encoding sortable binary database keys
stately.cloudΒ·19hΒ·
Discuss: Hacker News
πŸ’ΎDatabase Formats
I Vibecoded my first app
apps.apple.comΒ·18hΒ·
Discuss: Hacker News
πŸŒ€Brotli Dictionary
Ask HN: How to convince parents that half-hearted MS is worthless?
news.ycombinator.comΒ·1hΒ·
Discuss: Hacker News
🏴󠁧󠁒󠁳󠁣󠁴󠁿Scottish Computing
Proxmox Cluster Mini Rack
i.redd.itΒ·13hΒ·
Discuss: r/homelab
🏠Homelab Clusters
Canary tokens: Learn all about the unsung heroes of security at Grafana Labs
grafana.comΒ·18hΒ·
Discuss: Hacker News
🏺Kerberos Archaeology
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands
securityweek.comΒ·18hΒ·
Discuss: Hacker News
πŸ”€EBCDIC Privacy
Typeclassopedia
wiki.haskell.orgΒ·2dΒ·
Discuss: Hacker News
🧬Functional Programming
TabResFlow: A Normalizing Spline Flow Model for Probabilistic Univariate Tabular Regression
arxiv.orgΒ·1d
πŸ“ŠCount-Min Sketch
Open source providers: BSI sows uncertainty in politics and business
heise.deΒ·20h
πŸ”“Open Source Software
The Adaptive Communication Framework (ACF) for Extraterrestrial Intelligence Discovery
arxiv.orgΒ·11h
πŸ“°RSS Archaeology
Folder with sensitive info about Sweden's Nato accession left behind at airport
sverigesradio.seΒ·2d
πŸ”Swedish Cryptography
China linked Silk Typhoon targeted diplomats by hijacking web traffic
securityaffairs.comΒ·8h
πŸ”“Hacking
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.orgΒ·11h
πŸ”’Language-based security
The hidden threat in enterprise security: why it’s time to rethink PDFs
techradar.comΒ·7h
πŸ“„PDF Archaeology
Measuring Large Language Models Dependency: Validating the Arabic Version of the LLM-D12 Scale
arxiv.orgΒ·1d
πŸ”Information Retrieval
Learning Interior Point Method for AC and DC Optimal Power Flow
arxiv.orgΒ·11h
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap