🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

The New Currency War: US Stablecoin-China Digital Yuan Rivalry as a Test of Monetary Discipline
nakedcapitalism.comΒ·13h
🀝Distributed Consensus
Fostering Collaboration Across Industry Verticals within The Open Group
blog.opengroup.orgΒ·1d
πŸ‡ΈπŸ‡ͺNordic Standards
Spontaneous (dis)fluency
languagelog.ldc.upenn.eduΒ·8h
πŸ›Digital humanities
Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security
blackhillsinfosec.comΒ·7h
πŸ”“LDAP Injection
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewalls
blog.checkpoint.comΒ·6h
πŸ•ΈοΈMesh Networking
Luhn algorithm – Credit card number verification
en.wikipedia.orgΒ·3dΒ·
Discuss: Hacker News
πŸ”„CRC Algorithms
How to Slow Down a Program? And Why it Can Be Useful.
stefan-marr.deΒ·11hΒ·
Discuss: Lobsters, Hacker News, r/programming
πŸš€Compiler Optimizations
Demystifying Go Mutex: How Synchronization Works Under the Hood
dev.toΒ·8hΒ·
Discuss: DEV
🧠Separation Logic
Digital identity: German authorities do not monitor use
heise.deΒ·1d
πŸ”€EBCDIC Privacy
ByteDance releases OmniHuman-1.5: long-form, emotion-aware AI avatars
omnihuman-lab.github.ioΒ·1hΒ·
Discuss: Hacker News
🧠Learned Codecs
Hook Android Trojan Now Delivers Ransomware-Style Attacks
darkreading.comΒ·1d
πŸ”“Hacking
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.comΒ·3dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
nodeWSNsec: A hybrid metaheuristic approach for reliable security and node deployment in WSNs
arxiv.orgΒ·1d
πŸ•ΈοΈNetwork Topology
The Gold Standard of Cloud Security: Why Our SOC2 Type 2 Compliance Sets Backblaze Apart
backblaze.comΒ·6h
βœ…Archive Fixity
What Matters in Data for DPO?
arxiv.orgΒ·17h
πŸ›‘οΈDifferential Privacy
Development of the Measure of Assessment Self-Efficacy (MASE) for Quizzes and Exams
arxiv.orgΒ·17h
🧠Intelligence Compression
Quantum-Circuit-Based Visual Fractal Image Generation in Qiskit and Analytics
arxiv.orgΒ·17h
πŸ“Mathematical Art
Nx compromised: malware uses Claude code CLI to explore the filesystem
semgrep.devΒ·9hΒ·
Discuss: Lobsters, Hacker News
πŸ”Binary Forensics
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comΒ·2d
πŸ›‘Cybersecurity
TabResFlow: A Normalizing Spline Flow Model for Probabilistic Univariate Tabular Regression
arxiv.orgΒ·1d
πŸ“ŠCount-Min Sketch
Loading...Loading more...
AboutBlogChangelogRoadmap