🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Nordic Cryptography

Scandinavian Security Research, Regional Standards, Cultural Encryption, Swedish Innovation

New Keeb
theworksofegan.net·6h
⌨️Mechanical Keyboards
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.org·23h·
Discuss: Hacker News
🔓Password Cracking
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·15m
🎯Content Recommendation
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·13h·
Discuss: Hacker News
🌳Archive Merkle Trees
Which is the stronger password? g72$l#pT9a or –.COW
ianmccloy.com·17h·
Discuss: Hacker News
🔓Password Cracking
Stable, Mutable References for Ante
antelang.org·14h·
Discuss: Hacker News, r/programming
🔒Type Safety
7 Steps to Mastering No Code Automation with n8n for Data Professionals
kdnuggets.com·16h
🌊Stream Processing
FLINT: Fast Library for Number Theory
flintlib.org·9h
🧮Algebraic Datatypes
First absolute superconducting switch developed in a magnetic device
phys.org·10h·
Discuss: Hacker News
⚛️Quantum Tape
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·16h
🎯Threat Hunting
Explaining Fully Homomorphic Encryption to My Mom
olshansky.medium.com·29m·
Discuss: Hacker News
🔐Homomorphic Encryption
postMessaged and Compromised
msrc.microsoft.com·21h
🎯NTLM Attacks
Zero Trust Revisited
systemsapproach.org·20h
🕸️Mesh Networks
JNI Obfuscation, Reverse Engineering, and Android Security
hackernoon.com·16h
🎮Game Decompilation
Valuable News – 2025/08/25
discoverbsd.com·11h
🔌Operating system internals
25th August – Threat Intelligence Report
research.checkpoint.com·17h
🔓Hacking
Securing Heterogeneous Network (HetNet) Communications for Wildfire Management: Mitigating the Effects of Adversarial and Environmental Threats
arxiv.org·15m
🕸️Mesh Networking
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
How Smart Aluminum Fences Are Transforming Business Security
dev.to·7h·
Discuss: DEV
🏠Home Automation
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.org·15m
🌳Archive Merkle Trees
Loading...Loading more...
AboutBlogChangelogRoadmap