🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

Swedish universities call for increased collaboration with China
thelocal.se·12h
🇸Sweden
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·23h·
Discuss: Hacker News
🕸️WebP Analysis
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·4h
🎯Threat Hunting
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.com·6h
🎫Kerberos Attacks
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·58m
🎯Threat Hunting
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·2d
🔓Password Cracking
Coherent bunching of anyons and dissociation in an interference experiment
nature.com·3h
⚛️Quantum Channels
[$] Libxml2's "no security embargoes" policy
lwn.net·4h
🔓Free and open source
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.uk·18h
🔐Quantum Security
Announcing crabstep: A pure Rust, cross-platform, zero-dependency Apple/NeXTSTEP typedstream deserializer
github.com·2h
🔒Linear Types
Why ‘TRUST-NO-ONE’ Is Your Strongest Defense
infosecwriteups.com·11h
🌐Network Security
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·10h
🎫Kerberos Attacks
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.org·9h
🔓Hacking
Cyber insurance premiums dropped for the first time in 2024
metacurity.com·5h
🔓Hacking
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography
dev.to·3d·
Discuss: DEV
🔐Quantum Security
Counting with Categories (Part 3)
golem.ph.utexas.edu·1d
λLambda Formalization
Cybersecurity Basics: We're Cyber Essentials Recertified in 2025 (How You Can Do It Too)
thoughtbot.com·19h
🛡Cybersecurity
Confidential Wrapped Ethereum
ethresear.ch·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·5h·
Discuss: Hacker News
📋DFDL
Why Binary Won and Nothing Else Even Got Close
b0a04gl.site·1d·
Discuss: Hacker News
🧲RISC-V Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap