🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ‡ΈπŸ‡ͺ Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Apple's Swift Working to Support Android App Development
macrumors.comΒ·10h
πŸ”ŒInterface Evolution
This Week in Security: MegaOWNed, Store Danger, and FileFix
hackaday.comΒ·12h
πŸ”“Hacking
Wolf skulls reveal major 20th-century population turnover in Fennoscandia
phys.orgΒ·2d
🦴Database Paleontology
Show HN: Onesinglecounter, a Globally Available Counter
onesinglecounter.comΒ·12hΒ·
Discuss: Hacker News
πŸ“²syncthing
Ken Kocienda - Coding With AI using Cursor
kocienda.micro.blogΒ·17h
πŸ”„Language Evolution
The Whole Code Catalog
futureofcoding.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”—Concatenative Programming
Show HN: Shouldiuse.dev – software dependency health checker
shouldiuse.devΒ·3hΒ·
Discuss: Hacker News
πŸ”“Open Source Software
5How to Catch a Corporate Spy
forbes.comΒ·20hΒ·
Discuss: Hacker News
πŸ•³οΈInformation Leakage
Vitaly Kovalev, the Russian hacker who has offices and gives bonuses to his employees
english.elpais.comΒ·1d
πŸ”“Hacking
Engineers Build β€œUniversal Translator” for Quantum Computers
scitechdaily.comΒ·17h
βš›οΈQuantum Tape
I tested the EnGenius EOC655 bridge, an innovative product that combines Bluetooth and GPS
techradar.comΒ·12h
πŸ”ŒSingle Board PC
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Digital Privacy Everywhere
arxiv.orgΒ·3d
πŸ”Homomorphic Encryption
Single Core Hundred Thousand Concurrency(1751042929538900οΌ‰
dev.toΒ·6hΒ·
Discuss: DEV
🌊Stream Processing
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.comΒ·1d
🎯Threat Hunting
Vulnerability Debt: How Do You Put a Price on What to Fix?
darkreading.comΒ·9h
πŸ”“Hacking
How Europe can score points in the competition for quantum technology
heise.deΒ·3h
πŸ”Quantum Security
Floating-Point Data Transformation for Lossless Compression
arxiv.orgΒ·3d
🌊Streaming Compression
JavaScript Phone Number Formatting: A Comprehensive Guide
dev.toΒ·5hΒ·
Discuss: DEV
βœ…Format Verification
US Falling Behind China in Exploit Production
darkreading.comΒ·10h
πŸ›‘Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap